Mobile wireless computing: challenges in data management
Communications of the ACM
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Stream control transmission protocol (SCTP): a reference guide
Stream control transmission protocol (SCTP): a reference guide
International Journal of Network Management
Sleepers and workaholics: caching strategies in mobile environments (extended version)
The VLDB Journal — The International Journal on Very Large Data Bases
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
User needs for location-aware mobile services
Personal and Ubiquitous Computing
Cover story: they know where you are
IEEE Spectrum
Towards scalable location-aware services: requirements and research issues
GIS '03 Proceedings of the 11th ACM international symposium on Advances in geographic information systems
Exploring group mobility for replica data allocation in a mobile environment
CIKM '03 Proceedings of the twelfth international conference on Information and knowledge management
Implementing access control to people location information
Proceedings of the ninth ACM symposium on Access control models and technologies
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Distributed group-based cooperative caching in a mobile broadcast environment
Proceedings of the 6th international conference on Mobile data management
Adaptive nearest neighbor queries in travel time networks
Proceedings of the 13th annual ACM international workshop on Geographic information systems
Mondrian Multidimensional K-Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Skyline Queries Against Mobile Lightweight Devices in MANETs
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Towards Privacy-Aware Location-Based Database Servers
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Protecting Privacy in Continuous Location-Tracking Applications
IEEE Security and Privacy
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
An overview of the challenges and progress in meeting the E-911 requirement for location service
IEEE Communications Magazine
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Toward a distributed k-anonymity protocol for location privacy
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Privacy: preserving trajectory collection
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems
Towards a scalable model for location privacy
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
A network aware privacy model for online requests in trajectory data
Data & Knowledge Engineering
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Towards Achieving Personalized Privacy for Location-Based Services
Transactions on Data Privacy
Privacy for real-time location-based services
SIGSPATIAL Special
Privacy in location-based services: a system architecture perspective
SIGSPATIAL Special
A Hybrid Technique for Private Location-Based Queries with Database Protection
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
An efficient k-anonymous localization technique for assistive environments
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Data management challenges for computational transportation
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Privately querying location-based services with SybilQuery
Proceedings of the 11th international conference on Ubiquitous computing
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
PAD: privacy-area aware, dummy-based location privacy in mobile services
Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
PROS: a peer-to-peer system for location privacy protection on road networks
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Privacy of Value-Added Context-Aware Service Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
A reciprocal framework for spatial K-anonymity
Information Systems
A two-level protocol to answer private location-basedqueries
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
A new scheme of LBS privacy protection
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Privacy preserving group nearest neighbor queries
Proceedings of the 13th International Conference on Extending Database Technology
Preventing multi-query attack in location-based services
Proceedings of the third ACM conference on Wireless network security
Private location-based information retrieval through user collaboration
Computer Communications
Safeguarding location privacy in wireless ad-hoc networks
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
MOBIHIDE: a mobilea peer-to-peer system for anonymous location-based queries
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Context quality and privacy - friends or rivals?
QuaCon'09 Proceedings of the 1st international conference on Quality of context
Preserving privacy for location-based services with continuous queries
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Trust no one: a decentralized matching service for privacy in location based services
Proceedings of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds
Optimized query forgery for private information retrieval
IEEE Transactions on Information Theory
Event-based communication for location-based service collaboration
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
Achieving efficient query privacy for location based services
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
A taxonomy of approaches to preserve location privacy in location-based services
International Journal of Computational Science and Engineering
Anonymity preserving framework for location-based information services
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
"Don't trust anyone": Privacy protection for location-based services
Pervasive and Mobile Computing
Time warp: how time affects privacy in LBSs
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Design and analysis of a ranking approach to private location-based services
ACM Transactions on Database Systems (TODS)
Anonymous mobile service collaboration: quality of service
From active data management to event-based systems and more
Query-aware location anonymization for road networks
Geoinformatica
Protecting location privacy using location semantics
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
On the limitations of query obfuscation techniques for location privacy
Proceedings of the 13th international conference on Ubiquitous computing
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
Cover locations: availing location-based services without revealing the location
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Towards TTP-free lightweight solution for location privacy using location-based anonymity prediction
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
ACM SIGAPP Applied Computing Review
Transactions on Data Privacy
Shortest path computation with no information leakage
Proceedings of the VLDB Endowment
GLP: A cryptographic approach for group location privacy
Computer Communications
Optimal tag suppression for privacy protection in the semantic Web
Data & Knowledge Engineering
Hilbert-order based spatial cloaking algorithm in road network
Concurrency and Computation: Practice & Experience
A dummy-based anonymization method based on user trajectory with pauses
Proceedings of the 20th International Conference on Advances in Geographic Information Systems
Location privacy policy management system
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
SALS: semantics-aware location sharing based on cloaking zone in mobile social networks
Proceedings of the First ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems
Proceedings of the Third ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal Data
A collaborative protocol for anonymous reporting in vehicular ad hoc networks
Computer Standards & Interfaces
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
Mobile Networks and Applications
Privacy Preserving Cloud-Based Computing Platform (PPCCP) for Using Location Based Services
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
A profile anonymization model for location-based services
Journal of Computer Security
Hi-index | 0.06 |
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desired services. For example, a mobile user asking about her nearest restaurant has to report her exact location. With untrusted service providers, reporting private location information may lead to several privacy threats. In this paper, we present a peer-to-peer (P2P)spatial cloaking algorithm in which mobile and stationary users can entertain location-based services without revealing their exact location information. The main idea is that before requesting any location-based service, the mobile user will form a group from her peers via single-hop communication and/or multi-hop routing. Then,the spatial cloaked area is computed as the region that covers the entire group of peers. Two modes of operations are supported within the proposed P2P s patial cloaking algorithm, namely, the on-demand mode and the proactive mode. Experimental results show that the P2P spatial cloaking algorithm operated in the on-demand mode has lower communication cost and better quality of services than the proactive mode, but the on-demand incurs longer response time.