Practical data-swapping: the first steps
ACM Transactions on Database Systems (TODS)
The R*-tree: an efficient and robust access method for points and rectangles
SIGMOD '90 Proceedings of the 1990 ACM SIGMOD international conference on Management of data
The active badge location system
ACM Transactions on Information Systems (TOIS)
Cyberguide: a mobile context-aware tour guide
Wireless Networks - Special issue: mobile computing and networking: selected papers from MobiCom '96
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Communications of the ACM
Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
A security machanism for statistical database
ACM Transactions on Database Systems (TODS)
The statistical security of a statistical database
ACM Transactions on Database Systems (TODS)
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Evaluating probabilistic queries over imprecise data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Auditing and Inference Control in Statistical Databases
IEEE Transactions on Software Engineering
A privacy-preserving index for range queries
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
ICDT'05 Proceedings of the 10th international conference on Database Theory
An overview of the challenges and progress in meeting the E-911 requirement for location service
IEEE Communications Magazine
From data privacy to location privacy: models and algorithms
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
A TTP-free protocol for location privacy in location-based services
Computer Communications
Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
Towards a landmark influence framework to protect location privacy
Proceedings of the 2009 ACM symposium on Applied Computing
Privacy for real-time location-based services
SIGSPATIAL Special
Privacy and location anonymization in location-based services
SIGSPATIAL Special
Privacy in location-based services: a system architecture perspective
SIGSPATIAL Special
Approximate Evaluation of Range Nearest Neighbor Queries with Quality Guarantee
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Privately querying location-based services with SybilQuery
Proceedings of the 11th international conference on Ubiquitous computing
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Navigational path privacy protection: navigational path privacy protection
Proceedings of the 18th ACM conference on Information and knowledge management
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
A distortion-based metric for location privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Privacy preserving group nearest neighbor queries
Proceedings of the 13th International Conference on Extending Database Technology
Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks
Mobile Networks and Applications
Private location-based information retrieval through user collaboration
Computer Communications
Privacy-aware location data publishing
ACM Transactions on Database Systems (TODS)
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Wireless location privacy protection in vehicular ad-hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Privacy preserving through a memorizing algorithm in location-based services
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Privacy enhancements for mobile and social uses of consumer electronics
IEEE Communications Magazine
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Towards location-based social networking services
Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Location Based Social Networks
P2-CTM: privacy preserving collaborative traffic monitoring
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
A personal route prediction system based on trajectory data mining
Information Sciences: an International Journal
"Don't trust anyone": Privacy protection for location-based services
Pervasive and Mobile Computing
A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Air-Writing: a platform for scalable, privacy-preserving, spatial group messaging
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Query-aware location anonymization for road networks
Geoinformatica
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
On the limitations of query obfuscation techniques for location privacy
Proceedings of the 13th international conference on Ubiquitous computing
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
A privacy-aware framework for participatory sensing
ACM SIGKDD Explorations Newsletter
Quantifying location privacy: the case of sporadic location exposure
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
The VLDB Journal — The International Journal on Very Large Data Bases
Cover locations: availing location-based services without revealing the location
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Anonymizing geo-social network datasets
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Towards TTP-free lightweight solution for location privacy using location-based anonymity prediction
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
Privacy enhancement in mobile data broadcasting environments
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Measuring query privacy in location-based services
Proceedings of the second ACM conference on Data and Application Security and Privacy
Privacy aware publishing of successive location information in sensor networks
Future Generation Computer Systems
A spatial cloaking framework based on range search for nearest neighbor search
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Contextual privacy management in extended role based access control model
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Preserving location privacy for continuous queries on known route
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
ACM SIGAPP Applied Computing Review
Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
User Modeling and User-Adapted Interaction
Authenticating location-based services without compromising location privacy
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Location privacy in relation to trusted peers
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Security solutions for highly dynamic car2x networks in the KoFAS initiative
Nets4Cars/Nets4Trains'12 Proceedings of the 4th international conference on Communication Technologies for Vehicles
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Hilbert-order based spatial cloaking algorithm in road network
Concurrency and Computation: Practice & Experience
Countering overlapping rectangle privacy attack for moving kNN queries
Information Systems
Location privacy policy management system
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Techniques to protect privacy against inference attacks in location based services
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
Proceedings of the Third ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal Data
International Journal of Mobile Computing and Multimedia Communications
Semantic-Aware obfuscation for location privacy at database level
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Providing Users’ Anonymity in Mobile Hybrid Networks
ACM Transactions on Internet Technology (TOIT)
Private proximity detection and monitoring with vicinity regions
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess
Proceedings of the 4th ACM conference on Data and application security and privacy
The effect of homogeneity on the computational complexity of combinatorial data anonymization
Data Mining and Knowledge Discovery
Crowdsourcing privacy preferences in context-aware applications
Personal and Ubiquitous Computing
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Protecting query privacy in location-based services
Geoinformatica
A profile anonymization model for location-based services
Journal of Computer Security
Hi-index | 0.00 |
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency response, location-based advertisement, and location-based entertainment. An important challenge in wide deployment of location-based services (LBSs) is the privacy-aware management of location information, providing safeguards for location privacy of mobile clients against vulnerabilities for abuse. This paper describes a scalable architecture for protecting location privacy from various privacy threats resulting from uncontrolled usage of LBSs. This architecture includes the development of a personalized location anonymization model and a suite of location perturbation algorithms. A unique characteristic of our location privacy architecture is the use of a flexible privacy personalization framework to support location k-anonymity for a wide range of mobile clients with context-sensitive privacy requirements. This framework enables each mobile client to specify the minimum level of anonymity it desires and the maximum temporal and spatial tolerances it is willing to accept when requesting for k-anonymity preserving LBSs. We devise an efficient message perturbation engine to implement the proposed location privacy framework. The prototype we develop is designed to be run by the anonymity server on a trusted platform and performs location anonymization on LBS request messages of mobile clients, such as identity removal and spatio-temporal cloaking of location information. We study the effectiveness of our location cloaking algorithms under various conditions using realistic location data that is synthetically generated from real road maps and traffic volume data. Our experiments show that the personalized location k-anonymity model together with our location perturbation engine can achieve high resilience to location privacy threats without introducing any significant performance penalty.