Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Mix Zones: User Privacy in Location-aware Services
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Location Privacy through Secret Sharing Techniques
WOWMOM '05 Proceedings of the First International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing - Volume 03
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
Trajectory clustering: a partition-and-group framework
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Privacy Preservation in the Publication of Trajectories
MDM '08 Proceedings of the The Ninth International Conference on Mobile Data Management
Landscape-aware location-privacy protection in location-based services
Journal of Systems Architecture: the EUROMICRO Journal
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Non-Exposure Location Anonymity
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Privacy in Location-Based Services: State-of-the-Art and Research Directions
MDM '07 Proceedings of the 2007 International Conference on Mobile Data Management
On the Anonymity of Home/Work Location Pairs
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
A survey of computational location privacy
Personal and Ubiquitous Computing
BNCOD 26 Proceedings of the 26th British National Conference on Databases: Dataspace: The Final Frontier
ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS
MDM '09 Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
Anonymity and Historical-Anonymity in Location-Based Services
Privacy in Location-Based Applications
Privately querying location-based services with SybilQuery
Proceedings of the 11th international conference on Ubiquitous computing
Preventing velocity-based linkage attacks in location-aware applications
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Protecting location privacy against spatial inferences: the PROBE approach
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Toward trustworthy mobile sensing
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Privacy preserving group nearest neighbor queries
Proceedings of the 13th International Conference on Extending Database Technology
Preventing multi-query attack in location-based services
Proceedings of the third ACM conference on Wireless network security
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Location privacy protection through obfuscation-based techniques
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
MOBIHIDE: a mobilea peer-to-peer system for anonymous location-based queries
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
The PROBE Framework for the Personalized Cloaking of Private Locations
Transactions on Data Privacy
A taxonomy of approaches to preserve location privacy in location-based services
International Journal of Computational Science and Engineering
Coordinate transformation - a solution for the privacy problem of location based services?
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Design and analysis of a ranking approach to private location-based services
ACM Transactions on Database Systems (TODS)
MobiMix: Protecting location privacy with mix-zones over road networks
ICDE '11 Proceedings of the 2011 IEEE 27th International Conference on Data Engineering
SP '11 Proceedings of the 2011 IEEE Symposium on Security and Privacy
Position sharing for location privacy in non-trusted systems
PERCOM '11 Proceedings of the 2011 IEEE International Conference on Pervasive Computing and Communications
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
The VLDB Journal — The International Journal on Very Large Data Bases
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Map-Aware position sharing for location privacy in non-trusted systems
Pervasive'12 Proceedings of the 10th international conference on Pervasive Computing
Hi-index | 0.00 |
In recent years, location-based services have become very popular, mainly driven by the availability of modern mobile devices with integrated position sensors. Prominent examples are points of interest finders or geo-social networks such as Facebook Places, Qype, and Loopt. However, providing such services with private user positions may raise serious privacy concerns if these positions are not protected adequately. Therefore, location privacy concepts become mandatory to ensure the user's acceptance of location-based services. Many different concepts and approaches for the protection of location privacy have been described in the literature. These approaches differ with respect to the protected information and their effectiveness against different attacks. The goal of this paper is to assess the applicability and effectiveness of location privacy approaches systematically. We first identify different protection goals, namely personal information (user identity), spatial information (user position), and temporal information (identity/position + time). Secondly, we give an overview of basic principles and existing approaches to protect these privacy goals. In a third step, we classify possible attacks. Finally, we analyze existing approaches with respect to their protection goals and their ability to resist the introduced attacks.