The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
GROUP '01 Proceedings of the 2001 International ACM SIGGROUP Conference on Supporting Group Work
Security Considerations for a Distributed LocationService
Journal of Network and Systems Management
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
User needs for location-aware mobile services
Personal and Ubiquitous Computing
Using GPS to learn significant locations and predict movement across multiple users
Personal and Ubiquitous Computing
Geographic location tags on digital images
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
Extracting places from traces of locations
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
A study on the value of location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
PEPYS: generating autobiographies by automatic tracking
ECSCW'91 Proceedings of the second conference on European Conference on Computer-Supported Cooperative Work
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
User-Controllable Security and Privacy for Pervasive Computing
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Anonymous Data Collection in Sensor Networks
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
Inferring long-term user properties based on users' location history
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Safeguarding location privacy in wireless ad-hoc networks
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Louis, Lester and Pierre: three protocols for location privacy
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Simultaneous tracking and activity recognition (STAR) using many anonymous, binary sensors
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Place lab: device positioning using radio beacons in the wild
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Simulation of obfuscation and negotiation for location privacy
COSIT'05 Proceedings of the 2005 international conference on Spatial Information Theory
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
A spatiotemporal model of strategies and counter strategies for location privacy protection
GIScience'06 Proceedings of the 4th international conference on Geographic Information Science
Predestination: inferring destinations from partial trajectories
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Privacy for real-time location-based services
SIGSPATIAL Special
On the Optimal Placement of Mix Zones
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Preserving privacy in location-based mobile social applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Differentially private aggregation of distributed time-series with transformation and encryption
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
The PROBE Framework for the Personalized Cloaking of Private Locations
Transactions on Data Privacy
Proceedings of the 12th ACM international conference on Ubiquitous computing
Protecting location privacy against inference attacks
Proceedings of the 17th ACM conference on Computer and communications security
Protecting location privacy against inference attacks
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Privacy issues in location-aware browsing
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Ubiquitous computing: An overview of technology impacts
Telematics and Informatics
Caché: caching location-enhanced content to improve user privacy
ACM SIGMOBILE Mobile Computing and Communications Review
Cybercasing the joint: on the privacy implications of geo-tagging
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Privacy management and control in ATRACO
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
Personality-based privacy management for location-sharing in diverse subpopulations
Proceedings of the 2011 iConference
"Don't trust anyone": Privacy protection for location-based services
Pervasive and Mobile Computing
Time warp: how time affects privacy in LBSs
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Improving local search ranking through external logs
Proceedings of the 34th international ACM SIGIR conference on Research and development in Information Retrieval
Third party geolocation services in LBS: privacy requirements and research issues
Transactions on Data Privacy
Show Me How You Move and I Will Tell You Who You Are
Transactions on Data Privacy
SEC'11 Proceedings of the 20th USENIX conference on Security
Anonymization of location data does not work: a large-scale measurement study
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Quantifying location privacy: the case of sporadic location exposure
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Privacy in mobile computing for location-sharing-based services
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
A study on context services model with location privacy
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Symbolic finite state transducers: algorithms and applications
POPL '12 Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Collaborative location privacy with rational users
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
Fast track article: Balancing behavioral privacy and information utility in sensory data flows
Pervasive and Mobile Computing
Spatial big-data challenges intersecting mobility and cloud computing
MobiDE '12 Proceedings of the Eleventh ACM International Workshop on Data Engineering for Wireless and Mobile Access
Uniform obfuscation for location privacy
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Map-Aware position sharing for location privacy in non-trusted systems
Pervasive'12 Proceedings of the 10th international conference on Pervasive Computing
Attacking location privacy: exploring human strategies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
A privacy-by-design approach to location sharing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Privacy context model for dynamic privacy adaptation in ubiquitous computing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Deanonymizing mobility traces: using social network as a side-channel
Proceedings of the 2012 ACM conference on Computer and communications security
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
On the feasibility of user de-anonymization from shared mobile sensor data
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
Collecting location-based voice messages on a TalkingBadge
Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design
Middleware for location privacy: an overview
Proceedings of the 2012 ACM Research in Applied Computation Symposium
Privacy by design: a formal framework for the analysis of architectural choices
Proceedings of the third ACM conference on Data and application security and privacy
Predictive spatio-temporal queries: a comprehensive survey and future directions
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems
Location privacy revisited: factors of privacy decisions
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Privacy manipulation and acclimation in a location sharing application
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Protecting privacy for group nearest neighbor queries with crowdsourced data and computing
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Geo-indistinguishability: differential privacy for location-based systems
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Enabling fine-grained permissions for augmented reality applications with recognizers
SEC'13 Proceedings of the 22nd USENIX conference on Security
Relative Location Oriented Mobile LBS
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Intelligent supervisory control system for home devices using a cyber physical approach
Integrated Computer-Aided Engineering - Anniversary Volume: Celebrating 20 Years of Excellence
ipShield: a framework for enforcing context-aware privacy
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 0.00 |
This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples' attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.