Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Foundations of statistical natural language processing
Foundations of statistical natural language processing
Data mining: concepts and techniques
Data mining: concepts and techniques
A Framework for Generating Network-Based Moving Objects
Geoinformatica
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Mining sequences with temporal annotations
Proceedings of the 2006 ACM symposium on Applied computing
Protection of Location Privacy using Dummies for Location-based Services
ICDEW '05 Proceedings of the 21st International Conference on Data Engineering Workshops
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment
MDM '08 Proceedings of the The Ninth International Conference on Mobile Data Management
Location-Based Services: Back to the Future
IEEE Pervasive Computing
Spatial generalisation algorithms for LBS privacy preservation
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Location Diversity: Enhanced Privacy Protection in Location Based Services
LoCA '09 Proceedings of the 4th International Symposium on Location and Context Awareness
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Anonymity and Historical-Anonymity in Location-Based Services
Privacy in Location-Based Applications
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
Preserving Anonymity of Recurrent Location-Based Queries
TIME '09 Proceedings of the 2009 16th International Symposium on Temporal Representation and Reasoning
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services
MDM '10 Proceedings of the 2010 Eleventh International Conference on Mobile Data Management
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
SP '11 Proceedings of the 2011 IEEE Symposium on Security and Privacy
Measuring query privacy in location-based services
Proceedings of the second ACM conference on Data and Application Security and Privacy
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Collaborative location privacy with rational users
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
Exploring dependency for query privacy protection in location-based services
Proceedings of the third ACM conference on Data and application security and privacy
Constructing and comparing user mobility profiles for location-based services
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 0.00 |
The popularity of location-based services (LBSs) leads to severe concerns on users' privacy. With the fast growth of Internet applications such as online social networks, more user information becomes available to the attackers, which allows them to construct new contextual information. This gives rise to new challenges for user privacy protection and often requires improvements on the existing privacy-preserving methods. In this paper, we classify contextual information related to LBS query privacy and focus on two types of contexts--user profiles and query dependency: user profiles have not been deeply studied in LBS query privacy protection, while we are the first to show the impact of query dependency on users' query privacy. More specifically, we present a general framework to enable the attackers to compute a distribution on users with respect to issuing an observed request. The framework can model attackers with different contextual information. We take user profiles and query dependency as examples to illustrate the implementation of the framework and their impact on users' query privacy. Our framework subsequently allows us to show the insufficiency of existing query privacy metrics, e.g., k-anonymity, and propose several new metrics. In the end, we develop new generalisation algorithms to compute regions satisfying users' privacy requirements expressed in these metrics. By experiments, our metrics and algorithms are shown to be effective and efficient for practical usage.