Experiences of developing and deploying a context-aware tourist guide: the GUIDE project
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
CAPEUS: An Architecture for Context-Aware Selection and Execution of Services
Proceedings of the IFIP TC6 / WG6.1 Third International Working Conference on New Developments in Distributed Applications and Interoperable Systems
Context Attributes: An Approach to Enable Context-awareness for Service Discovery
SAINT '03 Proceedings of the 2003 Symposium on Applications and the Internet
Bluetooth and WAP push based location-aware mobile advertising system
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Protection of Privacy in Pervasive Computing Environments
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
Proceedings of the 6th international conference on Mobile data management
Using ubiquitous computing in interactive mobile marketing
Personal and Ubiquitous Computing
Protection of Location Privacy using Dummies for Location-based Services
ICDEW '05 Proceedings of the 21st International Conference on Data Engineering Workshops
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Anonymity and Diversity in LBS: A Preliminary Investigation
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Navitime: Supporting Pedestrian Navigation in the Real World
IEEE Pervasive Computing
Anonymity in Location-Based Services: Towards a General Framework
MDM '07 Proceedings of the 2007 International Conference on Mobile Data Management
Towards security and privacy for pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Context obfuscation for privacy via ontological descriptions
LoCA'05 Proceedings of the First international conference on Location- and Context-Awareness
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
COSAR: hybrid reasoning for context-aware activity recognition
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Privacy preserving technologies are likely to become an essential component of adaptive services in pervasive and mobile computing. Although privacy issues have been studied for a long time in computer science as well as in other fields, most studies are focused on the release of data from large repositories. Mobile and pervasive computing pose new challenges, requiring specific formal models for attacks and new privacy preserving techniques. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a defense technique is proposed. This defense is formally proved to be correct, and its effectiveness is validated by extensive experiments in a simulated environment.