Elements of information theory
Elements of information theory
Communications of the ACM
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
An authorization model for temporal data
Proceedings of the 7th ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
MIXes in Mobile Communication Systems: Location Management with Privacy
Proceedings of the First International Workshop on Information Hiding
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Mix Zones: User Privacy in Location-aware Services
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Techniques for Efficient Road-Network-Based Tracking of Moving Objects
IEEE Transactions on Knowledge and Data Engineering
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Proceedings of the 6th international conference on Mobile data management
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
CarTel: a distributed mobile sensor computing system
Proceedings of the 4th international conference on Embedded networked sensor systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Preserving location privacy in wireless lans
Proceedings of the 5th international conference on Mobile systems, applications and services
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Predestination: inferring destinations from partial trajectories
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
Seeing our signals: combining location traces and web-based models for personal discovery
Proceedings of the 9th workshop on Mobile computing systems and applications
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
Towards trajectory anonymization: a generalization-based approach
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Realtime location privacy via mobility prediction: creating confusion at crossroads
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
A network aware privacy model for online requests in trajectory data
Data & Knowledge Engineering
Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy
Transactions on Data Privacy
Towards Trajectory Anonymization: a Generalization-Based Approach
Transactions on Data Privacy
On the Anonymity of Home/Work Location Pairs
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Privacy and location anonymization in location-based services
SIGSPATIAL Special
A survey of computational location privacy
Personal and Ubiquitous Computing
Virtual individual servers as privacy-preserving proxies for mobile devices
Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds
Hiding stars with fireworks: location privacy through camouflage
Proceedings of the 15th annual international conference on Mobile computing and networking
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
VTrack: accurate, energy-aware road traffic delay estimation using mobile phones
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
A distortion-based metric for location privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Query privacy in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Poster Abstract: CacheCloak: enabling realtime location privacy for mobile users
ACM SIGMOBILE Mobile Computing and Communications Review
A location privacy metric for V2X communication systems
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
PRISM: platform for remote sensing using smartphones
Proceedings of the 8th international conference on Mobile systems, applications, and services
Measuring long-term location privacy in vehicular communication systems
Computer Communications
On the age of pseudonyms in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Anonymization of moving objects databases by clustering and perturbation
Information Systems
An online framework for publishing privacy-sensitive location traces
Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access
VPriv: protecting privacy in location-based vehicular services
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Privacy vulnerability of published anonymous mobility traces
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Proceedings of the 12th ACM international conference on Ubiquitous computing
Mobile location tracking in metro areas: malnets and others
Proceedings of the 17th ACM conference on Computer and communications security
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Privacy-preserving publication of trajectories using microaggregation
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
P2-CTM: privacy preserving collaborative traffic monitoring
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Uncertainty for anonymity and 2-dimensional range query distortion
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
AnonySense: A system for anonymous opportunistic sensing
Pervasive and Mobile Computing
Time warp: how time affects privacy in LBSs
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Real-time trip information service for a large taxi fleet
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Trajectory anonymity in publishing personal mobility data
ACM SIGKDD Explorations Newsletter
Quantifying location privacy: the case of sporadic location exposure
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Privacy and accountability for location-based aggregate statistics
Proceedings of the 18th ACM conference on Computer and communications security
Privacy-aware querying over sensitive trajectory data
Proceedings of the 20th ACM international conference on Information and knowledge management
Privacy-preserving location publishing under road-network constraints
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Friendship-based location privacy in Mobile Social Networks
International Journal of Security and Networks
AdNext: a visit-pattern-aware mobile advertising system for urban commercial complexes
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Koi: a location-privacy platform for smartphone apps
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Microaggregation- and permutation-based anonymization of movement data
Information Sciences: an International Journal
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Protecting location privacy: optimal strategy against localization attacks
Proceedings of the 2012 ACM conference on Computer and communications security
Exploring dependency for query privacy protection in location-based services
Proceedings of the third ACM conference on Data and application security and privacy
Linking anonymous location traces through driving characteristics
Proceedings of the third ACM conference on Data and application security and privacy
Privacy vulnerability of published anonymous mobility traces
IEEE/ACM Transactions on Networking (TON)
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Protecting query privacy in location-based services
Geoinformatica
Optimizing mix-zone coverage in pervasive wireless networks
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.00 |
Motivated by a probe-vehicle based automotive traffic monitoring system, this paper considers the problem of guaranteed anonymity in a dataset of location traces while maintaining high data accuracy. We find through analysis of a set of GPS traces from 233 vehicles that known privacy algorithms cannot meet accuracy requirements or fail to provide privacy guarantees for drivers in low-density areas. To overcome these challenges, we develop a novel time-to-confusion criterion to characterize privacy in a location dataset and propose an uncertainty-aware path cloaking algorithm that hides location samples in a dataset to provide a time-to-confusion guarantee for all vehicles. We show that this approach effectively guarantees worst case tracking bounds, while achieving significant data accuracy improvements.