The most common techniques to perform this change are:
Each technique for obfuscating location has strengths and weaknesses, and it is important to assess them based on each use case. For example, adding random noise is simple to implement, but can inadvertently create a circle of obfuscated values where the center reveals the individual's exact location. One should also consider the level of obfuscation required in urban areas versus rural areas.
See also: Location-based service
M. Duckham, L. Kulik and A. Birtley, "A Formal Model of Obfuscation and Negotiation for Location Privacy." In Proc. Pervasive 2005. LCNC 3468/2005, pp. 243–251, 2005 ↩
T. Rodden, A. Friday, H. Muller, and A. Dix, "A Lightweight Approach to Managing Privacy in Location-Based Services". Technical Report. Equator-02-058. CSTR-07-006, University of Nottingham and Lancaster University and University of Bristol. October 2002. ↩
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking". In Proc. MobiSys ’03, pp. 31–42, 2003. ↩
M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, "Geo-indistinguishability: differential privacy for location-based systems". In Proc. of CCS 2013, ACM, pp. 901–914, 2013. /wiki/Catuscia_Palamidessi ↩
Krumm, J, “Inference Attacks on Location Tracks”. In Proc. Pervasive 2007, Springer-Verlag, pp. 127–143. ↩
Ardagna, Claudio; Cremonini, Marco; De Capitani di Vimercati, Sabrina; Samarati, Pierangela (1 January 2011). "An Obfuscation-Based Approach for Protecting Location Privacy". IEEE Transactions on Dependable and Secure Computing. 8 (1): 13–27. CiteSeerX 10.1.1.182.9007. doi:10.1109/TDSC.2009.25. S2CID 105178. /wiki/CiteSeerX_(identifier) ↩