scispace - formally typeset
Journal ArticleDOI

Ensuring Privacy in Location-Based Services: An Approach Based on Opacity Enforcement

Reads0
Chats0
TLDR
This work synthesizes suitable insertion functions that insert fake queries into the cloaking query sequences and design an optimal insertion function that introduces minimum average number of fake queries to enforce location privacy.
About
This article is published in IFAC Proceedings Volumes.The article was published on 2014-01-01. It has received 32 citations till now. The article focuses on the topics: Location-based service & Mobility model.

read more

Citations
More filters
Journal ArticleDOI

Overview of Discrete Event Systems Opacity: models, validation, and quantification

TL;DR: This paper aims to review the most commonly used techniques of opacity validation for deterministic models and opacity quantification for probabilistic ones and existing tools for opacity validation and current applications.
Journal ArticleDOI

A new approach for the verification of infinite-step and K-step opacity using two-way observers

TL;DR: New algorithms for the verification of the properties of infinite-step opacity and K -step opacity for partially-observed discrete event systems modeled as finite-state automata are presented, based on a novel separation principle for state estimates that characterizes the information dependence in opacity verification problems.
Journal ArticleDOI

Synthesis of Optimal Insertion Functions for Opacity Enforcement

TL;DR: This paper proposes a more compact AIS that can be constructed with lower computational complexity, and introduces the maximum total cost and the maximum mean cost, and uses them as quantitative objectives to solve for optimal insertion functions.
Journal ArticleDOI

Synthesis of Dynamic Masks for Infinite-Step Opacity

TL;DR: An effective algorithm is presented to solve the synthesis problem, which extends existing dynamic mask synthesis techniques from the current-state opacity to infinite-step opacity, and an information-state-reduction-based approach is proposed to further mitigate the computational complexity of the synthesis procedure.
Journal ArticleDOI

Synthesis of Dynamic Masks for Infinite-Step Opacity

TL;DR: A new type of information state is proposed to capture all delayed information in the infinite-step opacity problem and an effective algorithm is presented to solve the synthesis problem.
References
More filters
Book

Introduction to Discrete Event Systems

TL;DR: This edition includes recent research results pertaining to the diagnosis of discrete event systems, decentralized supervisory control, and interval-based timed automata and hybrid automata models.
Proceedings ArticleDOI

Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking

TL;DR: A middleware architecture and algorithms that can be used by a centralized location broker service that adjusts the resolution of location information along spatial or temporal dimensions to meet specified anonymity constraints based on the entities who may be using location services within a given area.
Journal ArticleDOI

Location privacy in pervasive computing

TL;DR: The mix zone is introduced-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity, based on frequently changing pseudonyms.
Proceedings ArticleDOI

The new Casper: query processing for location services without compromising privacy

TL;DR: Zhang et al. as mentioned in this paper presented Casper1, a new framework in which mobile and stationary users can entertain location-based services without revealing their location information, which consists of two main components, the location anonymizer and the privacy-aware query processor.
Proceedings ArticleDOI

An anonymous communication technique using dummies for location-based services

TL;DR: This paper proposes an anonymous communication technique to protect the location privacy of the users of location-based services and describes a cost reduction technique for communication between a client and a server.
Related Papers (5)