Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
User needs for location-aware mobile services
Personal and Ubiquitous Computing
Using GPS to learn significant locations and predict movement across multiple users
Personal and Ubiquitous Computing
Wireless Location Privacy Protection
Computer
Extracting places from traces of locations
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
IAAI'06 Proceedings of the 18th conference on Innovative applications of artificial intelligence - Volume 2
Location-based activity recognition using relational Markov networks
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
Spatial security policies for mobile agents in a sentient computing environment
FASE'03 Proceedings of the 6th international conference on Fundamental approaches to software engineering
LoCA'05 Proceedings of the First international conference on Location- and Context-Awareness
Learning and recognizing the places we go
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Predestination: inferring destinations from partial trajectories
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Automatic identification of informal social groups and places for geo-social recommendations
International Journal of Mobile Network Design and Innovation
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
A critical evaluation of location based services and their potential
Journal of Location Based Services
A frequency based sighting blurring algorithm for use with location based services on the internet
Proceedings of the 10th international conference on Human computer interaction with mobile devices and services
Seeing our signals: combining location traces and web-based models for personal discovery
Proceedings of the 9th workshop on Mobile computing systems and applications
Time geography rediscovered: a common language for location-oriented services
Proceedings of the 2nd International Workshop on Location and the Web
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Proceedings of the 7th international conference on Mobile systems, applications, and services
Realistic Driving Trips For Location Privacy
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
On the Anonymity of Home/Work Location Pairs
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Privacy for real-time location-based services
SIGSPATIAL Special
A survey of computational location privacy
Personal and Ubiquitous Computing
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
On the Optimal Placement of Mix Zones
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
VTrack: accurate, energy-aware road traffic delay estimation using mobile phones
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
ePet: when cellular phone learns to recognize its owner
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
A distortion-based metric for location privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Faking contextual data for fun, profit, and privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Lagrangian sensing: traffic estimation with mobile devices
ACC'09 Proceedings of the 2009 conference on American Control Conference
A location privacy metric for V2X communication systems
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
PERSONAF: framework for personalised ontological reasoning in pervasive computing
User Modeling and User-Adapted Interaction
Preserving privacy in location-based mobile social applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Preventing multi-query attack in location-based services
Proceedings of the third ACM conference on Wireless network security
PPAA: peer-to-peer anonymous authentication
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Measuring long-term location privacy in vehicular communication systems
Computer Communications
On the age of pseudonyms in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
An online framework for publishing privacy-sensitive location traces
Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Trust no one: a decentralized matching service for privacy in location based services
Proceedings of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds
VPriv: protecting privacy in location-based vehicular services
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Proceedings of the 12th ACM international conference on Ubiquitous computing
Show me how you move and I will tell you who you are
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Personal data vaults: a locus of control for personal data streams
Proceedings of the 6th International COnference
PrETP: privacy-preserving electronic toll pricing
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Air-Writing: a platform for scalable, privacy-preserving, spatial group messaging
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Show Me How You Move and I Will Tell You Who You Are
Transactions on Data Privacy
Pervasive'11 Proceedings of the 9th international conference on Pervasive computing
On the difficulty of achieving anonymity for Vehicle-2-X communication
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the limitations of query obfuscation techniques for location privacy
Proceedings of the 13th international conference on Ubiquitous computing
Anonymization of location data does not work: a large-scale measurement study
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Trajectory anonymity in publishing personal mobility data
ACM SIGKDD Explorations Newsletter
Quantifying location privacy: the case of sporadic location exposure
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Sensorsafe: a framework for privacy-preserving management of personal sensory information
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Cover locations: availing location-based services without revealing the location
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Privacy and accountability for location-based aggregate statistics
Proceedings of the 18th ACM conference on Computer and communications security
Friendship-based location privacy in Mobile Social Networks
International Journal of Security and Networks
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Friends radar: towards a private P2P location sharing platform
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part II
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Indistinguishable regions in geographic privacy
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Human mobility modeling at metropolitan scales
Proceedings of the 10th international conference on Mobile systems, applications, and services
The shy mayor: private badges in geosocial networks
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Attacking location privacy: exploring human strategies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
A privacy-by-design approach to location sharing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Preserving location privacy by distinguishing between public and private spaces
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Protecting location privacy: optimal strategy against localization attacks
Proceedings of the 2012 ACM conference on Computer and communications security
Towards an understanding of social inference opportunities in social computing
Proceedings of the 17th ACM international conference on Supporting group work
Linking anonymous location traces through driving characteristics
Proceedings of the third ACM conference on Data and application security and privacy
Techniques to protect privacy against inference attacks in location based services
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
A framework for privacy and security analysis of probe-based traffic information systems
Proceedings of the 2nd ACM international conference on High confidence networked systems
Enabling secure location-based services in mobile cloud computing
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing
Fine-grained sharing of sensed physical activity: a value sensitive approach
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Inferring trip destinations from driving habits data
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Haze: privacy-preserving real-time traffic statistics
Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Although the privacy threats and countermeasures associated with location data are well known, there has not been a thorough experiment to assess the effectiveness of either. We examine location data gathered from volunteer subjects to quantify how well four different algorithms can identify the subjects' home locations and then their identities using a freely available, programmable Web search engine. Our procedure can identify at least a small fraction of the subjects and a larger fraction of their home addresses. We then apply three different obscuration countermeasures designed to foil the privacy attacks: spatial cloaking, noise, and rounding. We show how much obscuration is necessary to maintain the privacy of all the subjects.