Location Privacy in Pervasive Computing
IEEE Pervasive Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Vehicular Mobility Simulation for VANETs
ANSS '07 Proceedings of the 40th Annual Simulation Symposium
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Micro-Blog: sharing and querying content through mobile phones and social participation
Proceedings of the 6th international conference on Mobile systems, applications, and services
Protecting Privacy in Continuous Location-Tracking Applications
IEEE Security and Privacy
Realtime location privacy via mobility prediction: creating confusion at crossroads
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Place-Its: a study of location-based reminders on mobile phones
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Trust no one: a decentralized matching service for privacy in location based services
Proceedings of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds
Privacy vulnerability of published anonymous mobility traces
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Caché: caching location-enhanced content to improve user privacy
ACM SIGMOBILE Mobile Computing and Communications Review
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Protecting location privacy: optimal strategy against localization attacks
Proceedings of the 2012 ACM conference on Computer and communications security
On location privacy and quality of information in participatory sensing
Proceedings of the 8h ACM symposium on QoS and security for wireless and mobile networks
Application and analysis of multidimensional negative surveys in participatory sensing applications
Pervasive and Mobile Computing
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Privacy vulnerability of published anonymous mobility traces
IEEE/ACM Transactions on Networking (TON)
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
Mobile Networks and Applications
Anonymizing continuous queries with delay-tolerant mix-zones over road networks
Distributed and Parallel Databases
Hi-index | 0.00 |
Individuals face privacy risks when providing personal location data to potentially untrusted location based services (LBSs). We develop and demonstrate CacheCloak, a system that enables realtime anonymization of location data. In CacheCloak, a trusted anonymizing server generates mobility predictions from historical data and submits intersecting predicted paths simultaneously to the LBS. Each new predicted path is made to intersect with other users' paths, ensuring that no individual user's path can be reliably tracked over time. Mobile users retrieve cached query responses for successive new locations from the trusted server, triggering new prediction only when no cached response is available for their current locations. A simulated hostile LBS with detailed mobility pattern data attempts to track users of CacheCloak, generating a quantitative measure of location privacy over time. GPS data from a GIS-based traffic simulation in an urban environment shows that CacheCloak can achieve realtime location privacy without loss of location accuracy or availability.