Practical data-swapping: the first steps
ACM Transactions on Database Systems (TODS)
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Selectivity estimation in spatial databases
SIGMOD '99 Proceedings of the 1999 ACM SIGMOD international conference on Management of data
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Selectivity estimation for spatio-temporal queries to moving objects
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
A Framework for Generating Network-Based Moving Objects
Geoinformatica
CRB-Tree: An Efficient Indexing Scheme for Range-Aggregate Queries
ICDT '03 Proceedings of the 9th International Conference on Database Theory
LATIN '98 Proceedings of the Third Latin American Symposium on Theoretical Informatics
Efficient OLAP Operations in Spatial Data Warehouses
SSTD '01 Proceedings of the 7th International Symposium on Advances in Spatial and Temporal Databases
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Conceptual construction on incomplete survey data
Data & Knowledge Engineering
Range Aggregate Processing in Spatial Databases
IEEE Transactions on Knowledge and Data Engineering
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Exploring spatial datasets with histograms
Distributed and Parallel Databases
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Protecting data privacy through hard-to-reverse negative databases
International Journal of Information Security
Answering aggregation queries in a secure system model
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Data privacy protection in multi-party clustering
Data & Knowledge Engineering
Privacy-preserving anonymization of set-valued data
Proceedings of the VLDB Endowment
Privacy-preserving data publishing for cluster analysis
Data & Knowledge Engineering
Distributed Histograms for Processing Aggregate Data from Moving Objects
MDM '07 Proceedings of the 2007 International Conference on Mobile Data Management
Anonymous Data Collection in Sensor Networks
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
Four billion little brothers?: privacy, mobile phones, and ubiquitous data collection
Communications of the ACM - Scratch Programming for All
Accurate and large-scale privacy-preserving data mining using the election paradigm
Data & Knowledge Engineering
Negative representations of information
International Journal of Information Security
Anonymization of set-valued data via top-down, local generalization
Proceedings of the VLDB Endowment
The Role of Push-Pull Technology in Privacy Calculus: The Case of Location-Based Services
Journal of Management Information Systems
Location privacy protection through obfuscation-based techniques
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Discovering private trajectories using background information
Data & Knowledge Engineering
Privacy-aware traffic monitoring
IEEE Transactions on Intelligent Transportation Systems
Nearest neighbor search with strong location privacy
Proceedings of the VLDB Endowment
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Application and analysis of multidimensional negative surveys in participatory sensing applications
Pervasive and Mobile Computing
Classifying and clustering in negative databases
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.00 |
Privacy concerns can be a major barrier to collecting aggregate data from the public. Recent research proposes negative surveys that collect negative data, which is complementary to the true data. This opens a new direction for privacy-aware data collection. However, the existing approach cannot avoid certain errors when applied to many spatial data collection tasks. The errors can make the data unusable in many real scenarios. We propose Gaussian negative surveys. We modulate data collection based on Gaussian distribution. The collected data can be used to compute accurate spatial distribution of participants and can be used to accurately answer range aggregate queries. Our approach avoids the errors that can occur with the existing approach. Our experiments show that we achieve an excellent balance between privacy and accuracy.