Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Geoinformatica
User needs for location-aware mobile services
Personal and Ubiquitous Computing
Wireless Location Privacy Protection
Computer
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Landscape-aware location-privacy protection in location-based services
Journal of Systems Architecture: the EUROMICRO Journal
Privacy for real-time location-based services
SIGSPATIAL Special
A survey of computational location privacy
Personal and Ubiquitous Computing
PAD: privacy-area aware, dummy-based location privacy in mobile services
Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access
Safeguarding location privacy in wireless ad-hoc networks
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Providing location privacy in pervasive computing through a hybrid mechanism
International Journal of Internet Technology and Secured Transactions
Nearest neighbor search with strong location privacy
Proceedings of the VLDB Endowment
Design and analysis of a ranking approach to private location-based services
ACM Transactions on Database Systems (TODS)
Adjusting the trade-off between privacy guarantees and computational cost in secure hardware PIR
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
A spatiotemporal model of strategies and counter strategies for location privacy protection
GIScience'06 Proceedings of the 4th international conference on Geographic Information Science
Countering overlapping rectangle privacy attack for moving kNN queries
Information Systems
Anonymous spatial query on non-uniform data
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services
Hi-index | 0.00 |
Current mobile computing systems can automatically sense and communicate detailed data about a person's location. Location privacy is an urgent research issue because concerns about privacy are seen to be inhibiting the growth of mobile computing. This paper investigates a new technique for safeguarding location privacy, called obfuscation, which protects a person's location privacy by degrading the quality of information about that person's location. Obfuscation is based on spatial imperfection and offers an orthogonal approach to conventional techniques for safeguarding information about a person's location. Imprecision and inaccuracy are two types of imperfection that may be used to achieve obfuscation. A set of simulations are used to empirically evaluate different obfuscation strategies based on imprecision and inaccuracy. The results show that obfuscation can enable high quality of service in concert with high levels of privacy.