Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Preserving Privacy in Environments with Location-Based Applications
IEEE Pervasive Computing
Privacy-Preserving Location-Dependent Query Processing
ICPS '04 Proceedings of the The IEEE/ACS International Conference on Pervasive Services
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Proceedings of the 6th international conference on Mobile data management
Foundations of Multidimensional and Metric Data Structures (The Morgan Kaufmann Series in Computer Graphics and Geometric Modeling)
Access control to people location information
ACM Transactions on Information and System Security (TISSEC)
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Protecting Privacy in Continuous Location-Tracking Applications
IEEE Security and Privacy
Who's viewed you?: the impact of feedback in a mobile location-sharing application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Towards Trajectory Anonymization: a Generalization-Based Approach
Transactions on Data Privacy
Towards Achieving Personalized Privacy for Location-Based Services
Transactions on Data Privacy
A survey of computational location privacy
Personal and Ubiquitous Computing
Analyzing use of privacy policy attributes in a location sharing application
Proceedings of the 5th Symposium on Usable Privacy and Security
Interactive Location Cloaking with the PROBE Obfuscator
MDM '09 Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
Privacy in Location-Based Applications: Research Issues and Emerging Trends
Privacy in Location-Based Applications: Research Issues and Emerging Trends
Location Privacy Techniques in Client-Server Architectures
Privacy in Location-Based Applications
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
Protecting location privacy against spatial inferences: the PROBE approach
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Anonymous Query Processing in Road Networks
IEEE Transactions on Knowledge and Data Engineering
Privacy-aware mobile services over road networks
Proceedings of the VLDB Endowment
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Preserving privacy in semantic-rich trajectories of human mobility
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Privacy issues in location-aware browsing
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Analyzing semantic locations cloaking techniques in a probabilistic grid-based map
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
Time warp: how time affects privacy in LBSs
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Third party geolocation services in LBS: privacy requirements and research issues
Transactions on Data Privacy
C-safety: a framework for the anonymization of semantic trajectories
Transactions on Data Privacy
Protecting location privacy using location semantics
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Privacy by design: a formal framework for the analysis of architectural choices
Proceedings of the third ACM conference on Data and application security and privacy
SALS: semantics-aware location sharing based on cloaking zone in mobile social networks
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Enabling secure location-based services in mobile cloud computing
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing
Semantic trajectories modeling and analysis
ACM Computing Surveys (CSUR)
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
Mobile Networks and Applications
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Hi-index | 0.00 |
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscation (or cloaking), to protect location privacy is based on forwarding the LBS provider a coarse user location instead of the actual user location. Conventional approaches, based on such technique, are however based only on geometric methods and therefore are unable to assure privacy when the adversary is aware of the geographical context, in particular of the semantic locations and the statistical distribution of positions in the given space. This paper provides a comprehensive solution to this problem. We present a novel privacy model and an architectural framework for the personalized cloaking of semantic locations. In ourmodel, a cloaked location is an uncertainty regionwhich satisfies the privacy constraints specified by the user in the privacy profile (obfuscated location). We propose a strategy for generating obfuscated locations and evaluate different algorithms which implement efficiently such a strategy. The paper includes several experimental results assessing performance, storage requirements and accuracy for the approach. The paper also discusses the system architecture and shows that the approach can be deployed also for clients running on small devices.