Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
IEEE Transactions on Knowledge and Data Engineering
Mondrian Multidimensional K-Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Protecting Moving Trajectories with Dummies
MDM '07 Proceedings of the 2007 International Conference on Mobile Data Management
Towards Trajectory Anonymization: a Generalization-Based Approach
Transactions on Data Privacy
Approximate Evaluation of Range Nearest Neighbor Queries with Quality Guarantee
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Toward context and preference-aware location-based services
Proceedings of the Eighth ACM International Workshop on Data Engineering for Wireless and Mobile Access
On the Optimal Placement of Mix Zones
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
Distortion-based anonymity for continuous queries in location-based mobile services
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Location-dependent query processing: Where we are and where we are heading
ACM Computing Surveys (CSUR)
Anonymous Query Processing in Road Networks
IEEE Transactions on Knowledge and Data Engineering
Privacy-aware mobile services over road networks
Proceedings of the VLDB Endowment
The hardness and approximation algorithms for l-diversity
Proceedings of the 13th International Conference on Extending Database Technology
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
MOBIHIDE: a mobilea peer-to-peer system for anonymous location-based queries
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Efficient Evaluation of k-Range Nearest Neighbor Queries in Road Networks
MDM '10 Proceedings of the 2010 Eleventh International Conference on Mobile Data Management
Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking
IEEE Transactions on Mobile Computing
Closeness: A New Privacy Measure for Data Publishing
IEEE Transactions on Knowledge and Data Engineering
Privacy vulnerability of published anonymous mobility traces
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Towards location-based social networking services
Proceedings of the 2nd ACM SIGSPATIAL International Workshop on Location Based Social Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Query-aware location anonymization for road networks
Geoinformatica
MobiMix: Protecting location privacy with mix-zones over road networks
ICDE '11 Proceedings of the 2011 IEEE 27th International Conference on Data Engineering
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
CMOA: continuous moving object anonymization
Proceedings of the 16th International Database Engineering & Applications Sysmposium
Techniques to protect privacy against inference attacks in location based services
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
Efficient Time-Stamped Event Sequence Anonymization
ACM Transactions on the Web (TWEB)
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Hi-index | 0.00 |
The ubiquity of mobile devices with global positioning functionality (e.g., GPS and AGPS) and Internet connectivity (e.g., 3G andWi-Fi) has resulted in widespread development of location-based services (LBS). Typical examples of LBS include local business search, e-marketing, social networking, and automotive traffic monitoring. Although LBS provide valuable services for mobile users, revealing their private locations to potentially untrusted LBS service providers pose privacy concerns. In general, there are two types of LBS, namely, snapshot and continuous LBS. For snapshot LBS, a mobile user only needs to report its current location to a service provider once to get its desired information. On the other hand, a mobile user has to report its location to a service provider in a periodic or on-demand manner to obtain its desired continuous LBS. Protecting user location privacy for continuous LBS is more challenging than snapshot LBS because adversaries may use the spatial and temporal correlations in the user's location samples to infer the user's location information with higher certainty. Such user location trajectories are also very important for many applications, e.g., business analysis, city planning, and intelligent transportation. However, publishing such location trajectories to the public or a third party for data analysis could pose serious privacy concerns. Privacy protection in continuous LBS and trajectory data publication has increasingly drawn attention from the research community and industry. In this survey, we give an overview of the state-of-the-art privacy-preserving techniques in these two problems.