Filters








16,446 Hits in 6.2 sec

An online framework for publishing privacy-sensitive location traces

Wen Jin, Kristen LeFevre, Jignesh M. Patel
2010 Proceedings of the Ninth ACM International Workshop on Data Engineering for Wireless and Mobile Access - MobiDE '10  
Within this framework, we develop an initial set of algorithms for continuous privacy-preserving publishing.  ...  This paper studies the problem of protecting individual privacy when continuously publishing a stream of location trace data collected from a population of users.  ...  LOCATION TRACE PRIVACY In this section, we describe our framework for reasoning about location trace privacy.  ... 
doi:10.1145/1850822.1850824 dblp:conf/mobide/JinLP10 fatcat:7qytwzjh2rbirgihmrxqwiivd4

Privacy Inference Attack Against Users in Online Social Networks: A Literature Review

Yangheran Piao, Kai Ye, Xiaohui Cui
2021 IEEE Access  
A large amount of privacy information can be inferred from the content and social traces published by users, which leads to the rise of privacy inference technology for users in social networks.  ...  The contribution of our work is helpful for researchers to continue their research in this field. INDEX TERMS Social network, user privacy, inference attack, security.  ...  T Georgiou et al. introduced an attribute inference attack based on a community trend topic, which infers sensitive attributes of online social network users through topic text [18] .  ... 
doi:10.1109/access.2021.3064208 fatcat:rljfmzrkenfctjpcgpzrpvmume

Towards a New Classification of Location Privacy Methods in Pervasive Computing [chapter]

Mads Schaarup Andersen, Mikkel Baun Kjærgaard
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
This entails confusion for developers, lack of usage of privacy methods, and an unclear roadmap ahead for research within location privacy.  ...  Over the last decade many methods for location privacy have been proposed, but the mapping between classes of location based services and location privacy methods is not obvious.  ...  In the CS category, there has only been published anonymization location privacy methods.  ... 
doi:10.1007/978-3-642-30973-1_13 fatcat:h54yabdmsfhlhg25acphmuxv4q

Mobile Applications for Privacy-Preserving Digital Contact Tracing

Christos Laoudias, Steffen Meyer, Philippos Isaia, Thomas Windisch, Justus Benzler, Maximilian Lenkeit
2022 Zenodo  
Mobile applications for triggering Covid-19 exposure notifications without sacrificing the users' privacy are a promising tool for complementing manual contact tracing that is a resource-demanding and  ...  We provide an overview of this emerging field, while focusing on Bluetooth-based privacy-preserving solutions.  ...  Limited privacy 20 Mobile Applications for Privacy-Preserving Digital Contact Tracing @ 23 rd IEEE MDM 2022, Online, June 8, 2022 Mobile Applications for Privacy-Preserving Digital Contact Tracing  ... 
doi:10.5281/zenodo.6622627 fatcat:fkcwwnz4ebg6jhjpkpae77n7su

Privacy Preserving Location Data Publishing: A Machine Learning Approach [article]

Sina Shaham, Ming Ding, Bo Liu, Shuping Dang, Zihuai Lin, Jun Li
2019 arXiv   pre-print
The framework and all the proposed algorithms are applied to TDrive and Geolife location datasets.  ...  A variation of k-means algorithm is also proposed to preserve the privacy in overly sensitive datasets.  ...  Therefore, the framework developed in this paper can be used to anonymize the online traces of users before publishing web browsing data.  ... 
arXiv:1902.08934v2 fatcat:trg7neuxxvfanl4kfraebwsu6e

iShield: A Framework for Preserving Privacy of iOS App User

Arpita Jadhav Bhatt, Chetna Gupta, Sangeeta Mittal
2019 Journal of Cyber Security and Mobility  
Some methods have been proposed to preserve user's privacy of specific data like location and health information.  ...  Privacy threat to a user has been quantified by calculation of privacy disclosure score of an app user.  ...  There are various researches conducted on privacy concerns for online networks including social networks that deal with publishing user's data without leaking identity of user.  ... 
doi:10.13052/2245-1439.845 fatcat:subym6a6c5dibao6amndrh3dcy

Non-Pharmaceutical Interventions against COVID-19 Pandemic: Review of Contact Tracing and Social Distancing Technologies, Protocols, Apps, Security and Open Research Directions

Uzoma Rita Alo, Friday Onwe Nkwo, Henry Friday Nweke, Ifeanyi Isaiah Achi, Henry Anayo Okemiri
2021 Sensors  
The duo of social distancing and contact tracing are the major technological-based non-pharmaceutical public health intervention strategies adopted for combating the dreaded disease.  ...  In addition, the paper highlights different security/privacy vulnerabilities identified in contact tracing and social distancing technologies and solutions against these vulnerabilities.  ...  Some proposed contact tracing frameworks rely on data encryption. Similarly, An et al. [170] proposed a privacy-oriented technique for epidemic contact tracing (PROTECT).  ... 
doi:10.3390/s22010280 pmid:35009822 pmcid:PMC8749862 fatcat:y2g2oi4z2zavdc6hzju4hczb64

Geo-Targeting, Privacy, and the Rise of Consumer Location Trajectories

Meghanath M. Y, Beibei Li, Ying Natasha Zhang Foutz
2019 International Conference on Information Systems  
Outperforming multiple baselines, the proposed framework significantly reduces the privacy risk with minimal decrease in an advertiser's utility.  ...  We propose a personalized and interpretable framework to enable location data collectors to optimize the privacy-utility trade-off.  ...  Description Methodology Our framework aims at enabling a location data collector to publish data in a privacy preserving manner while ensuring that an advertiser gets sufficient utility.  ... 
dblp:conf/icis/YLF19 fatcat:smwgdpdqmvfxrhnnirz3wlymoe

Features of COVID-19 applications and their impact on contact tracing: results of preliminary review

Riikka Vuokko, Kaija Saranto, Sari Palojoki
2021 Finnish Journal of eHealth and eWelfare  
We conducted a literature review of COVID-19 tracing applications and related privacy issues using the PubMed database. For analysis, we conceptualized contact tracing and data privacy.  ...  However, along with contact tracing apps and comprehensive health programs, regulatory frameworks and safeguards are necessary to ensure that health information is not used for surveillance purposes and  ...  Acknowledgments The authors want to thank University of Eastern Finland for support in language review.  ... 
doi:10.23996/fjhw.109253 fatcat:lyicmzdahne7fil47mterawo4a

Attribute Couplet Attacks and Seclusion Protection in Social Networks

S. Archana, A. Sowndarya, R. Banumathi
2018 International Journal of Trend in Scientific Research and Development  
Design an approximate algorithm for multiple-attribute social networks to realize the k couplet anonymity.  ...  A common approach is to anonymize the identities of the users when publishing the data sets.  ...  In this work, we take an initial step towards quantifying location privacy leakage from MSNs by matching the users' shared locations with their real mobility traces.  ... 
doi:10.31142/ijtsrd11485 fatcat:lyyg7hsfuzglli3hrnug74vbpq

iShield: A Framework for Preserving Privacyof iOS App User

Arpita Jadhav Bhatt, Chetna Gupta, Sangeeta Mittal, Department of Computer Science & IT, Jaypee Institute of Information Technology, Noida, India, Department of Computer Science & IT, Jaypee Institute of Information Technology, Noida, India, Department of Computer Science & IT, Jaypee Institute of Information Technology, Noida, India
2019 Journal of Cyber Security and Mobility  
Some methods have been proposed to preserve user's privacy of specific data like location and health information.  ...  Privacy threat to a user has been quantified by calculation of privacy disclosure score of an app user.  ...  There are various researches conducted on privacy concerns for online networks including social networks that deal with publishing user's data without leaking identity of user.  ... 
doi:10.13052/jcsm2245-1439.845 fatcat:n3vhn2o5lzc4ragixydmdwddp4

A Multidimensional Analysis of Released COVID-19 Location-Based Mobile Applications

Theodoros Oikonomidis, Konstantinos Fouskas, Maro Vlachopoulou
2021 Future Internet  
As the world comes to the new normal, the utilization of these apps might become more essential for more mobile users and developers.  ...  Future work can utilize our framework to further examine the development, design, and adoption of such mobile applications.  ...  an issue for many users [34] .  ... 
doi:10.3390/fi13110268 fatcat:ay24at7g6jal3fbuy7xccjzskm

Towards an Understanding of Privacy Management Architecture in Big Data: An Experimental Research

Nick Hajli, Farid Shirazi, Mina Tajvidi, Nurul Huda
2020 British Journal of Management  
By devising an enterprise architecture using a privacy-by-design framework, this study provides a useful guide to addressing the managerial challenges of privacy management. of Management. Published  ...  The development of sophisticated technologies for data analysis has resulted in a growing concern around privacy management in big data. While many sites (e.g.  ...  user information into an online form.  ... 
doi:10.1111/1467-8551.12427 fatcat:3howqslgcng4hfh6lfg4c3u7sy

Privacy-aware personalization for mobile advertising

Michaela Hardt, Suman Nath
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
We evaluate our methods with a large click log of location-aware searches in Microsoft Bing for mobile.  ...  This is needed for end-to-end privacy of an ad system. We propose the first differentially-private distributed protocol that works even in the presence of a dynamic and malicious set of users.  ...  Each record in the trace describes an event of a user issuing a query from a location and then clicking on a business. The trace consists of 1,519,307 records.  ... 
doi:10.1145/2382196.2382266 dblp:conf/ccs/HardtN12 fatcat:lb6mil3rlbc57esxyrcd66vavy

Prolonging the Hide-and-Seek Game

George Theodorakopoulos, Reza Shokri, Carmela Troncoso, Jean-Pierre Hubaux, Jean-Yves Le Boudec
2014 Proceedings of the 13th Workshop on Privacy in the Electronic Society - WPES '14  
By construction, our LPPMs take into account the sequential correlation across the user's exposed locations, providing the maximum possible trajectory privacy, i.e., privacy for the user's past, present  ...  In this paper, we describe a method for creating LPPMs tailored to a user's mobility profile taking into her account privacy and quality of service requirements.  ...  The user must assigns low values if she is sensitive towards a particular location atrg. We treat dp as an input to our framework.  ... 
doi:10.1145/2665943.2665946 dblp:conf/wpes/Theodorakopoulos14 fatcat:kxgxn57745ehfh5gdzothkcjei
« Previous Showing results 1 — 15 out of 16,446 results