The Science of Fractal Images
Fractals for secondary key retrieval
PODS '89 Proceedings of the eighth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
K-d trees for semidynamic point sets
SCG '90 Proceedings of the sixth annual symposium on Computational geometry
The active badge location system
ACM Transactions on Information Systems (TOIS)
Space-filling curves and their use in the design of geometric data structures
Theoretical Computer Science - Special issue: Latin American theoretical informatics
The anatomy of a context-aware application
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
An Algorithm for Finding Best Matches in Logarithmic Expected Time
ACM Transactions on Mathematical Software (TOMS)
Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Analysis of the Clustering Properties of the Hilbert Space-Filling Curve
IEEE Transactions on Knowledge and Data Engineering
Analysis of an Anonymity Network for Web Browsing
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
LANDMARC: Indoor Location Sensing Using Active RFID
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Analysis of Multi-Dimensional Space-Filling Curves
Geoinformatica
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
VOR base stations for indoor 802.11 positioning
Proceedings of the 10th annual international conference on Mobile computing and networking
iDistance: An adaptive B+-tree based indexing method for nearest neighbor search
ACM Transactions on Database Systems (TODS)
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
The Lighthouse Location System for Smart Dust
Proceedings of the 1st international conference on Mobile systems, applications and services
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Challenges in Preserving Location Privacy in Peer-to-Peer Environments
WAIMW '06 Proceedings of the Seventh International Conference on Web-Age Information Management Workshops
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Anytime measures for top-k algorithms
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Protecting Privacy in Continuous Location-Tracking Applications
IEEE Security and Privacy
Outsourcing Search Services on Private Spatial Data
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Location privacy protection through obfuscation-based techniques
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Hi-index | 0.00 |
We address issues related to privacy protection in location-based services (LBSs). Most existing privacy-preserving LBS techniques either require a trusted third-party (anonymizer) or use cryptographic protocols that are computationally and communicationally expensive. Our design of privacy-preserving techniques is principled on not requiring a trusted third-party while being highly efficient in terms of time and space complexities. The problem has two interesting and challenging characteristics: First, the degree of privacy protection and LBS accuracy depends on the context, such as population and road density, around a user's location. Second, an adversary may violate a user's location privacy in two ways: (i) based on the user's location information contained in the LBS query payload and (ii) by inferring a user's geographical location based on the device's IP address. To address these challenges, we introduce CAP, a context-aware privacy-preserving LBS system with integrated protection for both data privacy and communication anonymity. We have implemented CAP and integrated it with Google Maps, a popular LBS system. Theoretical analysis and experimental results validate CAP's effectiveness on privacy protection, LBS accuracy, and communication QoS (Quality-of-Service).