2PASS: Bandwidth-optimized location cloaking for anonymous location-based services

Haibo Hu, Jianliang Xu

Research output: Journal article publicationJournal articleAcademic researchpeer-review

29 Citations (Scopus)


Protection of users' location privacy is a critical issue for location-based services. Location cloaking has been proposed to blur users' accurate locations with cloaked regions. Although various cloaking algorithms have been studied, none of the prior work has explored the impact of cloaking on the bandwidth usage of requested services. In this paper, we develop an innovative result-aware location cloaking approach, called 2PASS. Based on the notion of Voronoi cells, 2PASS minimizes the number of objects to request, and hence, the bandwidth while meeting the same privacy requirement. The core component of 2PASS is a lightweight WAG-tree index, based on which efficient and secure client and server procedures are designed. Through threat analysis and experimental results, we argue that 2PASS is robust and outperforms state-of-the-art approaches in terms of various metrics, such as query response time and bandwidth consumption. We also enclose a case study of 2PASS in a real-life application.
Original languageEnglish
Article number5406506
Pages (from-to)1458-1472
Number of pages15
JournalIEEE Transactions on Parallel and Distributed Systems
Issue number10
Publication statusPublished - 5 Jul 2010
Externally publishedYes


  • distributed applications
  • integrity
  • Mobile applications
  • protection
  • security

ASJC Scopus subject areas

  • Signal Processing
  • Hardware and Architecture
  • Computational Theory and Mathematics


Dive into the research topics of '2PASS: Bandwidth-optimized location cloaking for anonymous location-based services'. Together they form a unique fingerprint.

Cite this