Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Communications of the ACM
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Mixminion: Design of a Type III Anonymous Remailer Protocol
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Bridging the physical and digital in pervasive gaming
Communications of the ACM - The disappearing computer
Towards Privacy-Aware Location-Based Database Servers
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
Specification of a framework for the anonymous use of privileges
Telematics and Informatics - Special issue: Developing a culture of privacy in the global village
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Consumer Attitudes Toward Mobile Advertising: An Empirical Study
International Journal of Electronic Commerce
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
A TTP-free protocol for location privacy in location-based services
Computer Communications
A user study of policy creation in a flexible access-control system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
From t-Closeness to PRAM and Noise Addition Via Information Theory
PSD '08 Proceedings of the UNESCO Chair in data privacy international conference on Privacy in Statistical Databases
The SPARTA pseudonym and authorization system
Science of Computer Programming
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
A distributed k-anonymity protocol for location privacy
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
A survey of single-database private information retrieval: techniques and applications
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Location privacy protection through obfuscation-based techniques
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Certificate status validation in mobile ad hoc networks
IEEE Wireless Communications
A scalable and adaptive clustering scheme for MANETs
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Microaggregation for database and location privacy
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
A survey of clustering schemes for mobile ad hoc networks
IEEE Communications Surveys & Tutorials
Optimized query forgery for private information retrieval
IEEE Transactions on Information Theory
Information Sciences: an International Journal
Context-based distribution of points of interest
Proceedings of the seventh ACM international workshop on Mobility in the evolving internet architecture
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
A collaborative protocol for anonymous reporting in vehicular ad hoc networks
Computer Standards & Interfaces
Measuring the privacy of user profiles in personalized information systems
Future Generation Computer Systems
Hi-index | 0.30 |
Privacy and security are paramount in the proper deployment of location-based services (LBSs). We present a novel protocol based on user collaboration to privately retrieve location-based information from an LBS provider. Our approach does not assume that users or providers can be completely trusted with regard to privacy, and does not rely on a trusted third party. In addition, user queries, containing accurate locations, remain unchanged, and the collaborative protocol does not impose any special requirements on the query-response function of the LBS. Our protocol is analyzed in terms of privacy, network traffic, and processing overhead. We define the concept of guaranteed privacy breach probability, and we show that our proposal provides exponential scalability in that probability, at the expense of a linear relative network cost.