Disconnected operation in the Coda File System
ACM Transactions on Computer Systems (TOCS)
Synchronizing a database to improve freshness
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Optimal crawling strategies for web search engines
Proceedings of the 11th international conference on World Wide Web
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Replication is not needed: single database, computationally-private information retrieval
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
DeDe: design and evaluation of a context-enhanced mobile messaging system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Predictive Resource Management for Wearable Computing
Proceedings of the 1st international conference on Mobile systems, applications and services
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Experience with disconnected operation in a mobile computing environment
MLCS Mobile & Location-Independent Computing Symposium on Mobile & Location-Independent Computing Symposium
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Crawl ordering by search impact
WSDM '08 Proceedings of the 2008 International Conference on Web Search and Data Mining
Recrawl scheduling based on information longevity
Proceedings of the 17th international conference on World Wide Web
The Bayou Architecture: Support for Data Sharing Among Mobile Users
WMCSA '94 Proceedings of the 1994 First Workshop on Mobile Computing Systems and Applications
A survey of computational location privacy
Personal and Ubiquitous Computing
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
Hiding stars with fireworks: location privacy through camouflage
Proceedings of the 15th annual international conference on Mobile computing and networking
Privately querying location-based services with SybilQuery
Proceedings of the 11th international conference on Ubiquitous computing
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Modeling people's place naming preferences in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Achieving efficient query privacy for location based services
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Caché: caching location-enhanced content to improve user privacy
ACM SIGMOBILE Mobile Computing and Communications Review
Privad: practical privacy in online advertising
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Place lab: device positioning using radio beacons in the wild
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Cover locations: availing location-based services without revealing the location
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
404 not found: a quest for DTN applications
Proceedings of the third ACM international workshop on Mobile Opportunistic Networks
Opportunistic content sharing applications
Proceedings of the 1st ACM workshop on Emerging Name-Oriented Mobile Networking Design - Architecture, Algorithms, and Applications
CASA: context-aware scalable authentication
Proceedings of the Ninth Symposium on Usable Privacy and Security
Interest-based cloud-facilitated opportunistic networking
Proceedings of the 8th ACM MobiCom workshop on Challenged networks
SAC: semantic adaptive caching for spatial mobile applications
Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Anonymizing continuous queries with delay-tolerant mix-zones over road networks
Distributed and Parallel Databases
Hi-index | 0.00 |
We present the design, implementation, and evaluation of Caché, a system that offers location privacy for certain classes of location-based applications. The core idea in Caché is to periodically pre-fetch potentially useful location-enhanced content well in advance. Applications then retrieve content from a local cache on the mobile device when it is needed. This approach allows an end-user to make use of location-enhanced content while only revealing to third-party content providers a large geographic region rather than a precise location. In this paper, we present an analysis that examines tradeoffs in terms of storage, bandwidth, and freshness of data. We then discuss the design and implementation of an Android service embodying these ideas. Finally, we provide two evaluations of Caché. One measures the performance of our approach with respect to privacy and mobile content availability using real-world mobility traces. The other focuses on our experiences using Caché to enhance user privacy in three open source Android applications.