A Framework for Generating Network-Based Moving Objects
Geoinformatica
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Scalable application layer multicast
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Chord: a scalable peer-to-peer lookup protocol for internet applications
IEEE/ACM Transactions on Networking (TON)
Efficient OLAP Operations in Spatial Data Warehouses
SSTD '01 Proceedings of the 7th International Symposium on Advances in Spatial and Temporal Databases
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Improving Search in Peer-to-Peer Networks
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Querying peer-to-peer networks using P-trees
Proceedings of the 7th International Workshop on the Web and Databases: colocated with ACM SIGMOD/PODS 2004
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
BATON: a balanced tree structure for peer-to-peer networks
VLDB '05 Proceedings of the 31st international conference on Very large data bases
On k-anonymity and the curse of dimensionality
VLDB '05 Proceedings of the 31st international conference on Very large data bases
IEEE Transactions on Knowledge and Data Engineering
\ell -Diversity: Privacy Beyond \kappa -Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
From data privacy to location privacy: models and algorithms
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
A TTP-free protocol for location privacy in location-based services
Computer Communications
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Spatial generalisation algorithms for LBS privacy preservation
Journal of Location Based Services - Privacy Aware and Location-Based Mobile Services
Toward a distributed k-anonymity protocol for location privacy
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Location privacy based on trusted computing and secure logging
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A network aware privacy model for online requests in trajectory data
Data & Knowledge Engineering
Landscape-aware location-privacy protection in location-based services
Journal of Systems Architecture: the EUROMICRO Journal
Towards a landmark influence framework to protect location privacy
Proceedings of the 2009 ACM symposium on Applied Computing
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Location Diversity: Enhanced Privacy Protection in Location Based Services
LoCA '09 Proceedings of the 4th International Symposium on Location and Context Awareness
Privacy for real-time location-based services
SIGSPATIAL Special
Privacy and location anonymization in location-based services
SIGSPATIAL Special
Privacy in location-based services: a system architecture perspective
SIGSPATIAL Special
A Hybrid Technique for Private Location-Based Queries with Database Protection
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications
Journal of Systems and Software
Privacy-Aware Location Database Service for Granular Queries
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Privately querying location-based services with SybilQuery
Proceedings of the 11th international conference on Ubiquitous computing
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
PAD: privacy-area aware, dummy-based location privacy in mobile services
Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Privacy-aware mobile services over road networks
Proceedings of the VLDB Endowment
Privacy of Value-Added Context-Aware Service Cloud
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
A reciprocal framework for spatial K-anonymity
Information Systems
A two-level protocol to answer private location-basedqueries
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Privacy preserving group nearest neighbor queries
Proceedings of the 13th International Conference on Extending Database Technology
Preventing multi-query attack in location-based services
Proceedings of the third ACM conference on Wireless network security
Safeguarding location privacy in wireless ad-hoc networks
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
MOBIHIDE: a mobilea peer-to-peer system for anonymous location-based queries
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Privacy-aware location data publishing
ACM Transactions on Database Systems (TODS)
Preserving privacy for location-based services with continuous queries
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
An online framework for publishing privacy-sensitive location traces
Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Trust no one: a decentralized matching service for privacy in location based services
Proceedings of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds
A new cloaking algorithm using Hilbert curves for privacy protection
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
A taxonomy of approaches to preserve location privacy in location-based services
International Journal of Computational Science and Engineering
Nearest neighbor search with strong location privacy
Proceedings of the VLDB Endowment
"Don't trust anyone": Privacy protection for location-based services
Pervasive and Mobile Computing
Design and analysis of a ranking approach to private location-based services
ACM Transactions on Database Systems (TODS)
Towards communication-efficient private location dependent queries
Proceedings of the 2011 ACM Symposium on Applied Computing
Query-aware location anonymization for road networks
Geoinformatica
Protecting location privacy using location semantics
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preservation in the dissemination of location data
ACM SIGKDD Explorations Newsletter
Trajectory privacy in location-based services and data publication
ACM SIGKDD Explorations Newsletter
Location privacy protection in the presence of users' preferences
WAIM'11 Proceedings of the 12th international conference on Web-age information management
Anonymizing geo-social network datasets
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Towards TTP-free lightweight solution for location privacy using location-based anonymity prediction
Proceedings of the 2011 ACM Symposium on Research in Applied Computation
An open design privacy-enhancing platform supporting location-based applications
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
ACM SIGAPP Applied Computing Review
Shortest path computation with no information leakage
Proceedings of the VLDB Endowment
Indistinguishable regions in geographic privacy
Proceedings of the 27th Annual ACM Symposium on Applied Computing
GLP: A cryptographic approach for group location privacy
Computer Communications
Dissent in numbers: making strong anonymity scale
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Mobile cloud computing: A survey
Future Generation Computer Systems
Hilbert-order based spatial cloaking algorithm in road network
Concurrency and Computation: Practice & Experience
Location privacy policy management system
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Anonymous spatial query on non-uniform data
Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services
Exploring dependency for query privacy protection in location-based services
Proceedings of the third ACM conference on Data and application security and privacy
Proceedings of the Third ACM SIGSPATIAL International Workshop on Querying and Mining Uncertain Spatio-Temporal Data
Multi-agent based middleware for protecting privacy in IPTV content recommender services
Multimedia Tools and Applications
Preserving location privacy without exact locations in mobile services
Frontiers of Computer Science: Selected Publications from Chinese Universities
A privacy-preserving location-based alert system
Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Proceedings of the 4th ACM conference on Data and application security and privacy
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
A classification of location privacy attacks and approaches
Personal and Ubiquitous Computing
Protecting query privacy in location-based services
Geoinformatica
Privacy Preserving Cloud-Based Computing Platform (PPCCP) for Using Location Based Services
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
Hi-index | 0.00 |
Nowadays, mobile users with global positioning devices canaccess Location Based Services (LBS) and query about pointsof interest in their proximity. For such applications to succeed,privacy and confidentiality are essential. Encryptionalone is not adequate; although it safeguards the systemagainst eavesdroppers, the queries themselves may disclosethe location and identity of the user. Recently, there havebeen proposed centralized architectures based on K-anonymity,which utilize an intermediate anonymizer between themobile users and the LBS. However, the anonymizer mustbe updated continuously with the current locations of allusers. Moreover, the complete knowledge of the entire systemposes a security threat, if the anonymizer is compromised.In this paper we address two issues: (i) We show thatexisting approaches may fail to provide spatial anonymityfor some distributions of user locations and describe a noveltechnique which solves this problem. (ii) We propose Prive,a decentralized architecture for preserving the anonymityof users issuing spatial queries to LBS. Mobile users self-organizeinto an overlay network with good fault toleranceand load balancing properties. Prive avoids the bottleneckcaused by centralized techniques both in terms of anonymizationand location updates. Moreover, the system state isdistributed in numerous users, rendering Prive resilient toattacks. Extensive experimental studies suggest that Priveis applicable to real-life scenarios with large populations ofmobile users.