Algorithms for clustering data
Algorithms for clustering data
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Consistency Checking in Complex Object Database Schemata with Integrity Constraints
IEEE Transactions on Knowledge and Data Engineering
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Using GPS to learn significant locations and predict movement across multiple users
Personal and Ubiquitous Computing
Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets
Proceedings of the 2004 ACM symposium on Applied computing
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Protecting Privacy in Continuous Location-Tracking Applications
IEEE Security and Privacy
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Realistic Driving Trips For Location Privacy
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
A survey of computational location privacy
Personal and Ubiquitous Computing
Privacy and ethical issues in location-based tracking systems
ISTAS '09 Proceedings of the 2009 IEEE International Symposium on Technology and Society
On the Optimal Placement of Mix Zones
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
VTrack: accurate, energy-aware road traffic delay estimation using mobile phones
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
The UMTS-AKA protocols for intelligent transportation systems
EURASIP Journal on Wireless Communications and Networking
Lagrangian sensing: traffic estimation with mobile devices
ACC'09 Proceedings of the 2009 conference on American Control Conference
A location privacy metric for V2X communication systems
SARNOFF'09 Proceedings of the 32nd international conference on Sarnoff symposium
Preserving privacy in location-based mobile social applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Private location-based information retrieval through user collaboration
Computer Communications
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Measuring long-term location privacy in vehicular communication systems
Computer Communications
Privacy-aware traffic monitoring
IEEE Transactions on Intelligent Transportation Systems
On the age of pseudonyms in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
VPriv: protecting privacy in location-based vehicular services
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Show me how you move and I will tell you who you are
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Dynamic pricing incentive for participatory sensing
Pervasive and Mobile Computing
Personal data vaults: a locus of control for personal data streams
Proceedings of the 6th International COnference
PrETP: privacy-preserving electronic toll pricing
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
SignalGuru: leveraging mobile phones for collaborative traffic signal schedule advisory
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Show Me How You Move and I Will Tell You Who You Are
Transactions on Data Privacy
On the limitations of query obfuscation techniques for location privacy
Proceedings of the 13th international conference on Ubiquitous computing
Quantifying location privacy: the case of sporadic location exposure
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Cover locations: availing location-based services without revealing the location
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Privacy and accountability for location-based aggregate statistics
Proceedings of the 18th ACM conference on Computer and communications security
Friendship-based location privacy in Mobile Social Networks
International Journal of Security and Networks
TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Big brother knows your friends: on privacy of social communities in pervasive networks
Pervasive'12 Proceedings of the 10th international conference on Pervasive Computing
Attacking location privacy: exploring human strategies
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
A privacy-by-design approach to location sharing
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Protecting location privacy: optimal strategy against localization attacks
Proceedings of the 2012 ACM conference on Computer and communications security
Linking anonymous location traces through driving characteristics
Proceedings of the third ACM conference on Data and application security and privacy
Inferring social ties in academic networks using short-range wireless communications
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Inferring trip destinations from driving habits data
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Hi-index | 0.00 |
Future traffic-monitoring applications will be able to collect location traces from numerous GPS-equipped probe vehicles. This article discusses the privacy and data integrity challenges that this approach raises and presents an overview of architectural and algorithmic solutions. The proposed architecture splits communication and data analysis functions, thereby addressing privacy by separating data and identities. The authors also show that anonymous location samples stored in a database still let data mining algorithms reconstruct private information, such as home locations. Thus, a complete solution requires data suppression techniques to reduce these risks in addition to the proposed architecture. This article is part of a special issue on Intelligent Transportation.