Communications of the ACM
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
An authorization model for temporal data
Proceedings of the 7th ACM conference on Computer and communications security
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Mix Zones: User Privacy in Location-aware Services
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Remote Physical Device Fingerprinting
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Proceedings of the 6th international conference on Mobile data management
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
CarTel: a distributed mobile sensor computing system
Proceedings of the 4th international conference on Embedded networked sensor systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Surface street traffic estimation
Proceedings of the 5th international conference on Mobile systems, applications and services
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Louis, Lester and Pierre: three protocols for location privacy
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
Nericell: rich monitoring of road and traffic conditions using mobile smartphones
Proceedings of the 6th ACM conference on Embedded network sensor systems
A framework of energy efficient mobile sensing for automatic user state recognition
Proceedings of the 7th international conference on Mobile systems, applications, and services
StarTrack: a framework for enabling track-based applications
Proceedings of the 7th international conference on Mobile systems, applications, and services
Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy
Transactions on Data Privacy
Privacy and location anonymization in location-based services
SIGSPATIAL Special
Privacy in location-based services: a system architecture perspective
SIGSPATIAL Special
On the Optimal Placement of Mix Zones
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
VTrack: accurate, energy-aware road traffic delay estimation using mobile phones
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
A distortion-based metric for location privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Distributed or centralized traffic advisory systems: the application's take
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Demonstration of the TrajStore system
Proceedings of the VLDB Endowment
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Lagrangian sensing: traffic estimation with mobile devices
ACC'09 Proceedings of the 2009 conference on American Control Conference
Toward trustworthy mobile sensing
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Enabling energy efficient continuous sensing on mobile phones with LittleRock
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
Preserving privacy in participatory sensing systems
Computer Communications
PRISM: platform for remote sensing using smartphones
Proceedings of the 8th international conference on Mobile systems, applications, and services
ParkNet: drive-by sensing of road-side parking statistics
Proceedings of the 8th international conference on Mobile systems, applications, and services
Improving energy efficiency of location sensing on smartphones
Proceedings of the 8th international conference on Mobile systems, applications, and services
On the age of pseudonyms in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Anonymization of moving objects databases by clustering and perturbation
Information Systems
Towards trustworthy participatory sensing
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
VPriv: protecting privacy in location-based vehicular services
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Vehicular speed estimation using received signal strength from mobile phones
Proceedings of the 12th ACM international conference on Ubiquitous computing
P2-CTM: privacy preserving collaborative traffic monitoring
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Dynamic pricing incentive for participatory sensing
Pervasive and Mobile Computing
Personal data vaults: a locus of control for personal data streams
Proceedings of the 6th International COnference
Real-time trip information service for a large taxi fleet
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
SignalGuru: leveraging mobile phones for collaborative traffic signal schedule advisory
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Anonygator: privacy and integrity preserving data aggregation
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
SEC'11 Proceedings of the 20th USENIX conference on Security
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Sensorsafe: a framework for privacy-preserving management of personal sensory information
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Privacy and accountability for location-based aggregate statistics
Proceedings of the 18th ACM conference on Computer and communications security
YouProve: authenticity and fidelity in mobile sensing
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Sherlock holmes' evil twin: on the impact of global inference for online privacy
Proceedings of the 2011 workshop on New security paradigms workshop
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
The impact of trace and adversary models on location privacy provided by K-anonymity
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Koi: a location-privacy platform for smartphone apps
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
KNOWME: An Energy-Efficient Multimodal Body Area Network for Physical Activity Monitoring
ACM Transactions on Embedded Computing Systems (TECS) - Special Section on CAPA'09, Special Section on WHS'09, and Special Section VCPSS' 09
Towards fine-grained urban traffic knowledge extraction using mobile sensing
Proceedings of the ACM SIGKDD International Workshop on Urban Computing
Socially-aware market mechanism for participatory sensing
Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking
The shy mayor: private badges in geosocial networks
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Helping mobile apps bootstrap with fewer users
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Privacy-preserving distributed monitoring of visit quantities
Proceedings of the 20th International Conference on Advances in Geographic Information Systems
Radiator: context propagation based on delayed aggregation
Proceedings of the 2013 conference on Computer supported cooperative work
A framework for privacy and security analysis of probe-based traffic information systems
Proceedings of the 2nd ACM international conference on High confidence networked systems
CrowdAtlas: self-updating maps for cloud and personal use
Proceeding of the 11th annual international conference on Mobile systems, applications, and services
P3: toward privacy-preserving photo sharing
nsdi'13 Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
Towards a generic framework for trustworthy spatial crowdsourcing
Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess
Scalable Data Processing for Community Sensing Applications
Mobile Networks and Applications
No "one-size fits all": towards a principled approach for incentives in mobile crowdsourcing
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications
Synergistic approaches to mobile intelligent transportation systems considering low penetration rate
Pervasive and Mobile Computing
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, however, raise privacy concerns because they require participants to reveal their positions to an external traffic monitoring server. To address this challenge, we propose a system based on virtual trip lines and an associated cloaking technique. Virtual trip lines are geographic markers that indicate where vehicles should provide location updates. These markers can be placed to avoid particularly privacy sensitive locations. They also allow aggregating and cloaking several location updates based on trip line identifiers, without knowing the actual geographic locations of these trip lines. Thus they facilitate the design of a distributed architecture, where no single entity has a complete knowledge of probe identities and fine-grained location information. We have implemented the system with GPS smartphone clients and conducted a controlled experiment with 20 phone-equipped drivers circling a highway segment. Results show that even with this low number of probe vehicles, travel time estimates can be provided with less than 15% error, and applying the cloaking techniques reduces travel time estimation accuracy by less than 5% compared to a standard periodic sampling approach.