Filters








33 Hits in 5.3 sec

Location Privacy and Its Applications: A Systematic Study

Bo Liu, Wanlei Zhou, Tianqing Zhu, Longxiang Gao, Yong Xiang
2018 IEEE Access  
This in-depth analysis of the current state-of-play in location privacy is designed to provide a solid foundation for future studies in the field.  ...  Through this comprehensive review, all the interrelated aspects of location privacy are integrated into a unified framework.  ...  Generally speaking, obfuscation schemes will sacrifice the user's utility. While there is always a tradeoff between utility and privacy, there are some special cases. For example, Soma et al.  ... 
doi:10.1109/access.2018.2822260 fatcat:ekyvjw6hezctbls7jqp5zginxe

Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense

Zhikai XU, Hongli ZHANG, Xiangzhan YU, Shen SU
2016 IEICE transactions on information and systems  
Location-based services (LBSs) are useful for many applications in internet of things(IoT). However, LBSs has raised serious concerns about users' location privacy.  ...  In this paper, we propose a new location privacy attack in LBSs called hidden location inference attack, in which the adversary infers users' hidden locations based on the users' check-in histories.  ...  For example, in [8] , Zhao et al. proposed a location privacy preserving framework based on searchable encryption (SE).  ... 
doi:10.1587/transinf.2015inp0001 fatcat:doeaqzksafg5tax3ei6gyl3r6e

Privacy protection for users of location-based services

Kang G. Shin, Xiaoen Ju, Zhigang Chen, Xin Hu
2012 IEEE wireless communications  
LBSs, albeit useful and convenient, pose a serious threat to users' privacy as they are enticed to reveal their locations to LBS providers via their queries for location-based information.  ...  This article presents a comprehensive overview of the existing schemes for protecting LBS users' privacy.  ...  The authors would like to express their thanks to the anonymous reviewers for their valuable comments.  ... 
doi:10.1109/mwc.2012.6155874 fatcat:byi7ruy7vfhsfdedqmxdyr5ehm

On Preventing Location Attacks for Urban Vehicular Networks

Meng Zhou, Xin Li, Lejian Liao
2016 Mobile Information Systems  
In this paper, we proposed a sophisticated prediction model to predict driver's next location by using a k-order Markov chain-based third-rank tensor representing the partially observed transfer information  ...  Experimental results manifest the efficacy of the proposed model in terms of location predication accuracy, compared with several state-of-the-art predication methods.  ...  [22] proposed to model observed behaviors by learning context-aware action utilities for turn prediction, route prediction, and destination prediction. Wu et al.  ... 
doi:10.1155/2016/5850670 fatcat:7o7mx4xccbdxdfg5ipvy7nmoq4

Differential Privacy Models for Location-Based Services

Ehab ElSalamouny, Sébastien Gambs
2016 Transactions on Data Privacy  
In this model, we characterize the satisfiability conditions of (D, )-location privacy for a particular mechanism and also measure its utility with respect to an arbitrary loss function.  ...  In this context, we describe a general probabilistic model for obfuscation mechanisms for the locations whose output domain is the Euclidean space E 2 .  ...  Acknowledgements This work is partially funded by the Inria project lab CAPPRIS (Collaborative Actions on the Protection of Privacy Rights in the Information Society).  ... 
dblp:journals/tdp/ElSalamounyG16 fatcat:lhatbhisufga7anwozlnkdrbpi

A Survey on Trajectory Data Mining: Techniques and Applications

Zhenni Feng, Yanmin Zhu
2016 IEEE Access  
Furthermore, this paper reviews an extensive collection of existing trajectory data mining techniques and discusses them in a framework of trajectory data mining.  ...  This framework and the survey can be used as a guideline for designing future trajectory data mining solutions. INDEX TERMS Trajectory data mining, big data applications, data mining techniques.  ...  LOCATION/DESTINATION PREDICTION Location based services (LBSs), also called location-aware services, are increasingly beneficial to people in urban areas.  ... 
doi:10.1109/access.2016.2553681 fatcat:bwz3c6oyfjahroihps7i3wo76q

Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey

Nipendra Kayastha, Dusit Niyato, Ping Wang, Ekram Hossain
2011 Proceedings of the IEEE  
| The mobile social network (MSN) combines techniques in social science and wireless communications for mobile networking.  ...  KEYWORDS | Community detection; content distribution; context-aware data transfer; mobile social networking services and applications; network architecture and protocol design; security and privacy; social  ...  Moreover, with careful study of their encounter/re-encounter, one can predict the mobility patterns for a given period of time which can be utilized to effectively distribute the contents to the destination  ... 
doi:10.1109/jproc.2011.2169033 fatcat:qqrflfnnxnho5f7odt726lkykm

Quantifying and protecting location privacy

Reza Shokri
2015 it - Information Technology  
their own objectives which are in conflict with each other.  ...  We cast the problem of quantifying privacy as computing the estimation error in a statistical (Bayesian) inference problem, where an adversary combines his observation, background knowledge and side channel  ...  In this chapter, we propose a generic theoretical framework for quantifying location privacy of LBS users.  ... 
doi:10.1515/itit-2015-0024 fatcat:jbn5cdvprbgedmdxyh4usyogy4

Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking

Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady
2010 IEEE Transactions on Mobile Computing  
or fail to provide privacy guarantees for drivers in low-density areas.  ...  To overcome these challenges, we derive a novel time-to-confusion criterion to characterize privacy in a locational data set and propose a disclosure control algorithm (called uncertainty-aware path cloaking  ...  ACKNOWLEDGMENTS Most of this work completed while Baik Hoh was a PhD student at Rutgers University.  ... 
doi:10.1109/tmc.2010.62 fatcat:neq36cymqndlpnrg7mu2bv57li

Urban Sensing based on Mobile Phone Data: Approaches, Applications and Challenges [article]

Mohammadhossein Ghahramani, MengChu Zhou, Gang Wang
2020 arXiv   pre-print
Such insights allow a government to predict the adoption of new roads, new public transport routes, modification of existing infrastructure, and detection of congestion zones, resulting in more efficient  ...  To that end, monitoring people's interactions, whether counting them at fixed locations or tracking them by generating origin-destination matrices is crucial.  ...  They can be used to develop predictive models in a city-scale as a low-cost estimation for traffic.  ... 
arXiv:2008.12992v1 fatcat:i7ffg23bpncehoadczgfkuoqe4

A Survey on Measuring Anonymity in Anonymous Communication Systems

Tianbo Lu, Zeyu Du, Z. Jane Wang
2019 IEEE Access  
How to evaluate and quantify the anonymity that different anonymous communication systems can offer has been a new focus.  ...  As an important aspect of privacy, anonymity ensures that a subject may use resources or services without disclosing user identity or corresponding relationships.  ...  For privacy preserving computations, the notion of differential privacy is a standard for quantifying privacy.  ... 
doi:10.1109/access.2019.2919322 fatcat:y6z5mfulzbekjpwabpelsjbfuu

Privacy-Aware Time-Series Data Sharing with Deep Reinforcement Learning [article]

Ecenaz Erdemir, Pier Luigi Dragotti, Deniz Gunduz
2020 arXiv   pre-print
Methods that preserve the privacy for the current time may leak significant amount of information at the trace level as the adversary can exploit temporal correlations in a trace.  ...  In this work, we study the privacy-utility trade-off (PUT) in time-series data sharing.  ...  The user becomes aware of X t in an online manner and releases a distorted version Y t ∈ {w 1 , w 2 , w 3 }, following her privacy-preserving strategy. A.  ... 
arXiv:2003.02685v2 fatcat:6tpscswnkjha7anpm6o2gtbrpy

Trajectory anonymity in publishing personal mobility data

Francesco Bonchi, Laks V.S. Lakshmanan, Hui (Wendy) Wang
2011 SIGKDD Explorations  
In this survey, we discuss recent advancement on anonymity preserving data publishing of moving object databases in an off-line fashion.  ...  The use of these devices generates a huge collection of spatio-temporal data, variously called moving object data, trajectory data, or moblity data.  ...  This enables the attacker to break the privacy: by following a trace for only 10 minutes, the adversary may be able to track a vehicle from its home to a sensitive destination.  ... 
doi:10.1145/2031331.2031336 fatcat:lxzxblcqszah3p3uk7y5szks7m

29th International Conference on Data Engineering [book of abstracts]

2013 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW)  
In this paper, we report a novel data mining prediction system that has been built for a water utility in a big Chinese city.  ...  We have prototyped our framework in a commercial database system and present an experimental evaluation of our framework using the TPC-H benchmark. seminar 9: secure and Privacy-Preserving Database services  ...  These volunteers welcome participants, give directions, help in the sessions and on the registration desk, and generally make sure the conference is running smoothly.  ... 
doi:10.1109/icdew.2013.6547409 fatcat:wadzpuh3b5htli4mgb4jreoika

Efficient and Secure Mobile Cloud Networking [article]

Jacques Bou Abdo
2021 arXiv   pre-print
Mobile cloud computing is a very strong candidate for the title "Next Generation Network" which empowers mobile users with extended mobility, service continuity and superior performance.  ...  The OCMCA/user connection can utilize multicast channels leading to a much cheaper service for the users and more revenues, lower congestion and rejection rates for the operator.  ...  To propose EC-AKA as a corner stone in the privacy preserving mechanisms used with mobile cloud computing, we were interested in fortifying this protocol against all known AKA breaches and the result was  ... 
arXiv:2102.09051v2 fatcat:jfdwtdw75nef3fmxwaogbazxvq
« Previous Showing results 1 — 15 out of 33 results