Adaptively secure multi-party computation
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Non-Exposure Location Anonymity
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Proceedings of the 7th international conference on Mobile systems, applications, and services
SoundSense: scalable sound sensing for people-centric applications on mobile phones
Proceedings of the 7th international conference on Mobile systems, applications, and services
A survey of computational location privacy
Personal and Ubiquitous Computing
CAP: A Context-Aware Privacy Protection System for Location-Based Services
ICDCS '09 Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems
Privately querying location-based services with SybilQuery
Proceedings of the 11th international conference on Ubiquitous computing
A distortion-based metric for location privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
PRISM: platform for remote sensing using smartphones
Proceedings of the 8th international conference on Mobile systems, applications, and services
Towards trustworthy participatory sensing
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Protecting location privacy against inference attacks
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Personal data vaults: a locus of control for personal data streams
Proceedings of the 6th International COnference
SeMiTri: a framework for semantic annotation of heterogeneous trajectories
Proceedings of the 14th International Conference on Extending Database Technology
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure
Proceedings of the fourth ACM conference on Wireless network security
SP '11 Proceedings of the 2011 IEEE Symposium on Security and Privacy
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Quantifying location privacy: the case of sporadic location exposure
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Privacy-triggered communications in pervasive social networks
WOWMOM '11 Proceedings of the 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
Hi-index | 0.00 |
The participatory sensing paradigm, through the growing availability of cheap sensors in mobile devices, enables applications of great social and business interest, e.g., electrosmog exposure measurement and early earthquake detection. However, users' privacy concerns regarding their activity traces need to be adequately addressed as well. The existing static privacy-enabling approaches, which hide or obfuscate data, offer some protection at the expense of data value. These approaches do not offer privacy guarantees and heterogeneous user privacy requirements cannot be met by them. In this paper, we propose a user-side privacy-protection scheme; it adaptively adjusts its parameters, in order to meet personalized location-privacy protection requirements against adversaries in a measurable manner. As proved by simulation experiments with artificial- and real-data traces, when feasible, our approach not only always satisfies personal location-privacy concerns, but also maximizes data utility (in terms of error, data availability, area coverage), as compared to static privacy-protection schemes.