Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
SmokeScreen: flexible privacy controls for presence-sharing
Proceedings of the 5th international conference on Mobile systems, applications and services
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
Peopletones: a system for the detection and notification of buddy proximity on mobile phones
Proceedings of the 6th international conference on Mobile systems, applications, and services
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
A formal privacy system and its application to location based services
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
SMILE: encounter-based trust for mobile social services
Proceedings of the 16th ACM conference on Computer and communications security
Preserving privacy in location-based mobile social applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Secure encounter-based social networks: requirements, challenges, and designs
Proceedings of the 17th ACM conference on Computer and communications security
A privacy preserving system for friend locator applications
Proceedings of the 9th ACM international symposium on Mobility management and wireless access
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
The shy mayor: private badges in geosocial networks
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Attacks on Confidentiality of Communications Between Stranger Organizations
International Journal of Knowledge-Based Organizations
Hi-index | 0.00 |
There is an inherent tension between the value provided by Location-Based Services (LBSs) and the location-privacy concerns they raise. Unfortunately, users are often forced to either boycott LBS applications completely or fully trust a centralized service with their location data. In this paper, we propose several techniques for resolving this tension. In particular, we present a mechanism by which peers who shared a physical location and time can be matched by a central server, without compromising peer-to-server or peer-to-peer anonymity. We utilize k-anonymity techniques to maintain location privacy and cryptographic techniques to provide both a proof of this co-location and an end-to-end confidential channel that is invulnerable to server snooping and man-in-the-middle attacks.