How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Untraceable off-line cash in wallet with observers
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
User needs for location-aware mobile services
Personal and Ubiquitous Computing
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Simulation of obfuscation and negotiation for location privacy
COSIT'05 Proceedings of the 2005 international conference on Spatial Information Theory
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Location privacy based on trusted computing and secure logging
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Privacy for real-time location-based services
SIGSPATIAL Special
A survey of computational location privacy
Personal and Ubiquitous Computing
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
Privacy preserving group nearest neighbor queries
Proceedings of the 13th International Conference on Extending Database Technology
Preventing multi-query attack in location-based services
Proceedings of the third ACM conference on Wireless network security
Spatio-temporal database research at the University of Melbourne
ACM SIGMOD Record
"Don't trust anyone": Privacy protection for location-based services
Pervasive and Mobile Computing
Towards TTP-free lightweight solution for location privacy using location-based anonymity prediction
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
ACM SIGAPP Applied Computing Review
GLP: A cryptographic approach for group location privacy
Computer Communications
Countering overlapping rectangle privacy attack for moving kNN queries
Information Systems
Proceedings of the Third ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal Data
Protecting privacy for group nearest neighbor queries with crowdsourced data and computing
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Preserving location privacy without exact locations in mobile services
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.00 |
We present a novel algorithm that safeguards the location privacy of users accessing location-based services via mobile devices. Our technique exploits the capability of mobile devices to form wireless ad-hoc networks in order to hide a user's identity and position. Local ad-hoc networks enable us to separate an agent's request for location information, the query initiator, from the agent that actually requests this service on its behalf, the query requestor. Since a query initiator can select itself or one of the k - 1 agents in its ad-hoc network as a query requestor, the query initiator remains k-anonymous. In addition, the location revealed to the location service provider is a rectangle instead of an exact coordinate. We develop an anonymous selection algorithm that selects a query requestor with near-uniform randomness, which is a key component to ensure anonymity in an ad-hoc network. Our experiments show that a system can ensure a high quality of service and maintain a high degree of privacy in terms of anonymity and obfuscation while accessing location-based services.