Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Citations
1,239 citations
564 citations
Cites background or methods from "Protecting Location Privacy with Pe..."
...tasks and thus can be extended for trajectory data reduction [19, 22, 20, 21]....
[...]
...Spatial databases [19, 76, 130, 142], where the data items may have dimensionality and extent, but are (relatively) static over time; 2....
[...]
...sliding window algorithm developed for time series data mining can be adapted for trajectory approximation [19, 24]....
[...]
...One version of T-query is to discover common sub-trajectories [20, 19] and another version targets the problem...
[...]
...Identifying these regions with R-query is important in trajectory clustering [19, 17]....
[...]
386 citations
322 citations
318 citations
Cites background or methods from "Protecting Location Privacy with Pe..."
...…a field experiment that provided users with our self-designed applications to assess their response in the actual commercial context, and corroborated our findings through surveys to gain more robust understandings that incorporate both the perceptual beliefs and the actual behaviors of users....
[...]
...One such stream attempts to design security solutions, such as anonymizing techniques (e.g., Bulander et al. 2005; Gedik and Liu 2008) and peer-topeer user agents (e.g., Brar and Kay 2004)—to ensure the transmission of user information over communication networks is properly handled, but these…...
[...]
...…and that such a stream would be a good complement to the extant research focused on ensuring data transmission security (e.g., Brar and Kay 2004; Gedik and Liu 2008) and on providing users with the assurance that the information transmitted about them will not be abused (e.g., Andrade et al.…...
[...]
References
7,925 citations
"Protecting Location Privacy with Pe..." refers background in this paper
...…Published by the IEEE CS, CASS, ComSoc, IES, & SPS location with identity, such as person A lives in location L, and if it observes that all request messages within location L are from a single user, then it can infer that the identity of the user requesting the roadside information service is A....
[...]
4,686 citations
4,315 citations
"Protecting Location Privacy with Pe..." refers methods in this paper
...According to the report by the Computer Science and Telecommunications Board in IT Roadmap to a Geospatial Future [3], location-based services (LBSs) are expected to form an important part of the future computing environments that will be seamlessly and ubiquitously integrated into our lives....
[...]
2,430 citations
"Protecting Location Privacy with Pe..." refers background in this paper
...An adversary can utilize such location information to infer details about the private life of an individual such as their political affiliations, alternative lifestyles, or medical problems [8] or the private businesses of an organization such as new business initiatives and partnerships....
[...]
...…data, the CyberGuide [5] project investigates context-aware location-based electronic guide assistants, and the Federal Communications Commission (FCC)’s Phase II E911 requires wireless carriers to provide precise location information within 125 m in most cases for emergency purposes [6]....
[...]
...For instance, the NextBus [4] service provides location-based transportation data, the CyberGuide [5] project investigates context-aware location-based electronic guide assistants, and the Federal Communications Commission (FCC)’s Phase II E911 requires wireless carriers to provide precise location…...
[...]
...By semihonest we mean that the third-party LBS providers are honest and can correctly process and respond to messages, but are curious in that they may attempt to determine the identity of a user based on what they “see,” which includes information in the physical world that can lead to…...
[...]
...If a user submits her service request messages with raw position information, the privacy of the user can be compromised in several ways, assuming that the LBS providers are not trusted but semihonest....
[...]
2,291 citations