Location Privacy in Pervasive Computing
IEEE Pervasive Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Wireless Location Privacy Protection
Computer
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Show me how you move and I will tell you who you are
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Show Me How You Move and I Will Tell You Who You Are
Transactions on Data Privacy
Produre: A novel proximity discovery mechanism in location tagging system
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
On the difficulty of achieving anonymity for Vehicle-2-X communication
Computer Networks: The International Journal of Computer and Telecommunications Networking
PIR-Tor: scalable anonymous communication using private information retrieval
SEC'11 Proceedings of the 20th USENIX conference on Security
Anonymization of location data does not work: a large-scale measurement study
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
Quantifying location privacy: the case of sporadic location exposure
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Optimizing mixing in pervasive networks: a graph-theoretic perspective
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Assessing location privacy in mobile communication networks
ISC'11 Proceedings of the 14th international conference on Information security
A comparative privacy analysis of geosocial networks
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
The impact of trace and adversary models on location privacy provided by K-anonymity
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Human mobility modeling at metropolitan scales
Proceedings of the 10th international conference on Mobile systems, applications, and services
Design and evaluation of a privacy-preserving architecture for vehicle-to-grid interaction
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Location privacy in relation to trusted peers
STM'11 Proceedings of the 7th international conference on Security and Trust Management
The shy mayor: private badges in geosocial networks
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Attacking location privacy: exploring human strategies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
Protecting location privacy: optimal strategy against localization attacks
Proceedings of the 2012 ACM conference on Computer and communications security
Linking anonymous location traces through driving characteristics
Proceedings of the third ACM conference on Data and application security and privacy
Radiator: context propagation based on delayed aggregation
Proceedings of the 2013 conference on Computer supported cooperative work
A framework for context-aware privacy of sensor data on mobile systems
Proceedings of the 14th Workshop on Mobile Computing Systems and Applications
ACM SIGMOBILE Mobile Computing and Communications Review
Privacy representation in VANET
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Inferring trip destinations from driving habits data
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Privacy vulnerability of published anonymous mobility traces
IEEE/ACM Transactions on Networking (TON)
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Optimizing mix-zone coverage in pervasive wireless networks
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.00 |
Many applications benefit from user location data, but location data raises privacy concerns. Anonymization can protect privacy, but identities can sometimes be inferred from supposedly anonymous data. This paper studies a new attack on the anonymity of location data. We show that if the approximate locations of an individual's home and workplace can both be deduced from a location trace, then the median size of the individual's anonymity set in the U.S. working population is 1, 21 and 34,980, for locations known at the granularity of a census block, census track and county respectively. The location data of people who live and work in different regions can be re-identified even more easily. Our results show that the threat of re-identification for location data is much greater when the individual's home and work locations can both be deduced from the data. To preserve anonymity, we offer guidance for obfuscating location traces before they are disclosed.