Location Privacy in Pervasive Computing
IEEE Pervasive Computing
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy
Transactions on Data Privacy
Privacy in Location-Based Applications: Research Issues and Emerging Trends
Privacy in Location-Based Applications: Research Issues and Emerging Trends
Preventing velocity-based linkage attacks in location-aware applications
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
A reciprocal framework for spatial K-anonymity
Information Systems
Privacy-Conscious Location-Based Queries in Mobile Environments
IEEE Transactions on Parallel and Distributed Systems
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Louis, Lester and Pierre: three protocols for location privacy
PET'07 Proceedings of the 7th international conference on Privacy enhancing technologies
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
An Obfuscation-Based Approach for Protecting Location Privacy
IEEE Transactions on Dependable and Secure Computing
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
A spatiotemporal model of strategies and counter strategies for location privacy protection
GIScience'06 Proceedings of the 4th international conference on Geographic Information Science
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Protecting Location Privacy against Location-Dependent Attacks in Mobile Services
IEEE Transactions on Knowledge and Data Engineering
Hi-index | 0.00 |
In this paper, we study potential inference attacks targeting Location Based Service (LBS) users, and provide heuristic defense techniques to protect their privacy against such attacks. Having access to supplemental information such as subsequent query times, speed limits/travel times on the underlying road-network, and/or the residential/commercial address directory, adversaries might be able to infer sensitive information such as location, identity, and/or lifestyle about the querying LBS user. To prevent adversaries from connecting external information to user queries, we apply various heuristic privacy-preserving algorithms whose objective is to alter user queries in order to protect users against inference attacks while providing exact results in a timely manner. Our algorithms enable users to customize their privacy levels based on individual's preferences through the use of flexible user-controlled parameters. For this, we introduce the novel notion of (i, j)-privacy. We evaluate our algorithms experimentally on different road-networks varying a number of input parameters and present the results here. The outcomes of our experiments confirm that except for special cases where a high anonymity level is requested or queries are submitted with very high frequency, our algorithms provide quality results in less than few seconds.