scispace - formally typeset
Journal ArticleDOI

Shadow attacks on users' anonymity in pervasive computing environments

Reads0
Chats0
TLDR
It is shown that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users.
About
This article is published in Pervasive and Mobile Computing.The article was published on 2008-12-01. It has received 11 citations till now. The article focuses on the topics: Information privacy & Privacy software.

read more

Citations
More filters
Journal ArticleDOI

COSAR: hybrid reasoning for context-aware activity recognition

TL;DR: This paper proposes a solution based on the use of ontologies and ontological reasoning combined with statistical inferencing to recognize complex activities that cannot be derived by statistical methods alone.
Proceedings ArticleDOI

Opportunistic sensing: Security challenges for the new paradigm

TL;DR: The security challenges that arise in opportunistic people-centric sensing, a new sensing paradigm leveraging humans as part of the sensing infrastructure, are studied and general solutions that hold promise are suggested.
Journal ArticleDOI

Privacy protection in pervasive systems

TL;DR: A more holistic view of the privacy problem is taken by discussing other aspects that turn out to be crucial for the widespread adoption of privacy enhancing technologies, and technical challenges like the need for tools augmenting the awareness of individuals and to capture their privacy preferences are discussed.
Journal ArticleDOI

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

TL;DR: This paper identifies a taxonomy classifying eight categories of PETs into three groups, and for better clarity, it considers three categories of personalized services, and points out which PETs best fit each personalized service category.
Book ChapterDOI

Privacy in Georeferenced Context-Aware Services: A Survey

TL;DR: After identifying the benefits and shortcomings of each class of techniques, the paper proposes a combined approach to achieve a more comprehensive solution for privacy preservation in georeferenced context-aware services.
References
More filters
Proceedings ArticleDOI

Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking

TL;DR: A middleware architecture and algorithms that can be used by a centralized location broker service that adjusts the resolution of location information along spatial or temporal dimensions to meet specified anonymity constraints based on the entities who may be using location services within a given area.
Journal ArticleDOI

Protecting respondents identities in microdata release

TL;DR: This paper addresses the problem of releasing microdata while safeguarding the anonymity of respondents to which the data refer and introduces the concept of minimal generalization that captures the property of the release process not distorting the data more than needed to achieve k-anonymity.
Journal ArticleDOI

Location privacy in pervasive computing

TL;DR: The mix zone is introduced-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity, based on frequently changing pseudonyms.
Proceedings ArticleDOI

Constraining the Dark Energy Equation of State using Alternative High-z Cosmic Tracers

TL;DR: In this paper, the authors propose to use alternative cosmic tracers to measure the dark energy equation of state and the matter content of the universe [w(z)&Ωm].
Proceedings ArticleDOI

The new Casper: query processing for location services without compromising privacy

TL;DR: Zhang et al. as mentioned in this paper presented Casper1, a new framework in which mobile and stationary users can entertain location-based services without revealing their location information, which consists of two main components, the location anonymizer and the privacy-aware query processor.
Related Papers (5)