The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
PODS '96 Proceedings of the fifteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Temporal Granularity: Completing the Puzzle
Journal of Intelligent Information Systems
Time Granularities in Databases, Data Mining and Temporal Reasoning
Time Granularities in Databases, Data Mining and Temporal Reasoning
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Generating Scenarios for Periodic Events with Binary Constraints
TIME '99 Proceedings of the Sixth International Workshop on Temporal Representation and Reasoning
Mix Zones: User Privacy in Location-aware Services
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Supporting location-based conditions in access control policies
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
A distributed architecture to support infomobility services
AAA-IDEA '06 Proceedings of the 2nd international workshop on Advanced architectures and algorithms for internet delivery and applications
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites
SSDBM '08 Proceedings of the 20th international conference on Scientific and Statistical Database Management
A Free Terrain Model for Trajectory K---Anonymity
DEXA '08 Proceedings of the 19th international conference on Database and Expert Systems Applications
Spatial generalisation algorithms for LBS privacy preservation
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Shadow attacks on users' anonymity in pervasive computing environments
Pervasive and Mobile Computing
Privacy: preserving trajectory collection
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems
Information Leakage in Optimal Anonymized and Diversified Data
Information Hiding
Towards trajectory anonymization: a generalization-based approach
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
A network aware privacy model for online requests in trajectory data
Data & Knowledge Engineering
Anonymizing moving objects: how to hide a MOB in a crowd?
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Landscape-aware location-privacy protection in location-based services
Journal of Systems Architecture: the EUROMICRO Journal
Information Security and Cryptology --- ICISC 2008
Towards Trajectory Anonymization: a Generalization-Based Approach
Transactions on Data Privacy
A survey of computational location privacy
Personal and Ubiquitous Computing
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
A reciprocal framework for spatial K-anonymity
Information Systems
Location privacy protection through obfuscation-based techniques
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Safeguarding location privacy in wireless ad-hoc networks
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Location privacy in geospatial decision-making
DNIS'07 Proceedings of the 5th international conference on Databases in networked information systems
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Privacy preserving through a memorizing algorithm in location-based services
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Anonymization of moving objects databases by clustering and perturbation
Information Systems
An online framework for publishing privacy-sensitive location traces
Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Providing K-Anonymity in location based services
ACM SIGKDD Explorations Newsletter
A taxonomy of approaches to preserve location privacy in location-based services
International Journal of Computational Science and Engineering
"Don't trust anyone": Privacy protection for location-based services
Pervasive and Mobile Computing
Time warp: how time affects privacy in LBSs
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Trajectory anonymity in publishing personal mobility data
ACM SIGKDD Explorations Newsletter
Location privacy protection in the presence of users' preferences
WAIM'11 Proceedings of the 12th international conference on Web-age information management
Assessing location privacy in mobile communication networks
ISC'11 Proceedings of the 14th international conference on Information security
Privacy-preserving location publishing under road-network constraints
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Location privacy in relation to trusted peers
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Journal of Systems Architecture: the EUROMICRO Journal
Countering overlapping rectangle privacy attack for moving kNN queries
Information Systems
Exploring dependency for query privacy protection in location-based services
Proceedings of the third ACM conference on Data and application security and privacy
On the privacy offered by (k, δ)-anonymity
Information Systems
Techniques to protect privacy against inference attacks in location based services
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
Streaming driving behavior data
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
International Journal of Mobile Computing and Multimedia Communications
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
A profile anonymization model for location-based services
Journal of Computer Security
Hi-index | 0.00 |
This paper presents a preliminary investigation on the privacy issues involved in the use of location-based services. It is argued that even if the user identity is not explicitly released to the service provider, the geo-localized history of user-requests can act as a quasi-identifier and may be used to access sensitive information about specific individuals. The paper formally defines a framework to evaluate the risk in revealing a user identity via location information and presents preliminary ideas about algorithms to prevent this to happen.