A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
On the Trade-Off between User-Location Privacy and Queried-Location Privacy in Wireless Sensor Networks
[chapter]
2009
Lecture Notes in Computer Science
Experiments reveal that how dispersed the k queries are has no effect on the privacy of the user's location. ...
However, smaller k, randomized routing, and non-broadcast transmission improve the user's location privacy. ...
This paper sheds some light on the trade-off between preserving the privacy of the queried and current locations simultaneously. ...
doi:10.1007/978-3-642-04383-3_18
fatcat:p45qmxmuprhazouqu2icwicwlq
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
2012
Journal on spesial topics in mobile networks and applications
This paper reviews some of the methods currently being proposed to reduce the impact of location tracking on user privacy, and presents a novel encryption method for preserving the location and trajectory ...
While this type of information can be useful, when the offered services are trusted, it also introduces privacy issues relating to gathering of location information for non-trusted applications like locationbased ...
Chow [5] suggests that many methods do not separate location privacy from query privacy, and proposes a mechanism which ensures privacy for both, for spaces with a large number of continuous queries. ...
doi:10.1007/s11036-012-0362-6
fatcat:w62elvcxnvho5iqcqo4plmme6a
Secure and Privacy Preserving Navigation in VANET
2016
International Journal of Science and Research (IJSR)
In addition to message authentication and privacy preserving, our scheme also provide other necessary security requirements. ...
routes of shorter traveling time. ...
In [19] , an efficient social-tierassisted packet forwarding protocol STAP for achieving receiver-location privacy preservation in VANETs was proposed. ...
doi:10.21275/v5i3.nov162079
fatcat:efki4wscbfcg7gmgfkgi4oyaou
STATE-OF-THE-ART, CHALLENGES: PRIVACY PROVISIONING IN TTP LOCATION BASED SERVICES SYSTEMS
2019
International Journal of Advanced Research in Computer Science
In current study, we have conducted a comprehensive survey on TTP privacy protecting techniques which are being used in LBS systems. ...
Moreover, it is aimed to provide a promising roadmap to research and development communities for right selection of privacy approach. ...
Route Server [20] handover the authentic and efficient results for position queries. To post a route query there are queries of Q set {q1, q2, q3 ….. ...
doi:10.26483/ijarcs.v10i2.6396
fatcat:spktkotncnefneplzmc2a7ol2e
Preventing Restricted Space Inference in Online Route Planning Services
2015
Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
As suchlike leakage of personal information threatens a user's privacy and anonymity, this paper presents PrOSPR, a comprehensive approach for using current online route planning services in a privacy-preserving ...
Using a map-based approach for creating cloaked regions for the start and destination addresses, our solution queries the online service for routes between subsets of points from these regions. ...
To enable privacy-preserving route queries, suitable map extracts of the start and destination regions are determined by a trusted location obfuscator and can be downloaded from a map provider. ...
doi:10.4108/eai.22-7-2015.2260037
dblp:journals/sis/DorfmeisterWSM15
fatcat:vouazljclze27kzyxup6h7abq4
A Survey on Privacy Issues in Mobile Social Networks
2020
IEEE Access
Due to the widespread nature of MSNs and the lack of effective privacy-preserving architecture makes them a target for several attacks by adversaries and the users of the networks are completely vulnerable ...
This survey on privacy issues in MSNs serves as a way to provide an introduction to MSNs. ...
Another differential privacy based solution for preserving location privacy is LPT-DPk [56] . In this work, Yin et.al. focus on persevering frequent location patterns. ...
doi:10.1109/access.2020.3009691
fatcat:prx2edw2mbd4dkvgmowag3svla
Location Based Privacy Preserving System for Smart Phones
2017
International Journal for Research in Applied Science and Engineering Technology
This proposed system executed by efficiency privacy preserving based on location based service i.e., (LBS).The user identify specific location nearest user need to reach that location within time, accurate ...
Location based provider collection all query latency of user specified location and send to cloud server with encrypt user privacy data. ...
However, solutions designed primarily based on coordinate transformation would be susceptible to best-known sample attacks. 2) Privacy-Preserving POI Query Based on PIR: As so much as we all know, solely ...
doi:10.22214/ijraset.2017.3088
fatcat:ml5s7hgij5cp5ayeijhc6jeofi
In-Network Trajectory Privacy Preservation
2015
ACM Computing Surveys
However, location trajectory privacy concerns hinder the adoptability of such applications. ...
In this article, we survey existing trajectory privacy work in the context of wireless sensor networks, location-based services, and geosocial networks. ...
Location-aware devices continuously/periodically transmit data tagged with spatial and temporal coordinates, known as "trajectory information." ...
doi:10.1145/2818183
fatcat:hgc33wgqlrdnpll6bodpe7y5mm
Privacy preservation in wireless sensor networks: A state-of-the-art survey
2009
Ad hoc networks
We also discuss a number of important open challenges for future research. Our hope is that this paper sheds some light on a fruitful direction of future research for privacy preservation in WSNs. ...
This paper provides a state-of-theart survey of privacy-preserving techniques for WSNs. ...
The unique challenges for privacy preservation in WSNs call for the development of effective privacy-preserving techniques. ...
doi:10.1016/j.adhoc.2009.04.009
fatcat:v2daasfks5dijhqnledvfjdcgy
A Privacy-Preserving Social P2P Infrastructure for People-Centric Sensing
2011
Networked Systems
In this paper, we propose a protocol extension to our OSN design Vegas which enables secure, privacy-preserving, and trustful P2P communication between PCS participants. ...
The rapid miniaturization and integration of sensor technologies into mobile Internet devices combined with Online Social Networks allows for enhanced sensor information querying, subscription, and task ...
System Architecture In the following, we review parts of our OSN architecture developed in previous work before we present our P2P-based overlay query routing extension which allows for privacy-preserving ...
doi:10.4230/oasics.kivs.2011.176
dblp:conf/kivs/DurrW11
fatcat:n2vjdvnh3rdnlo64zbi7iosa3u
Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks
2013
International Journal of Computer Network and Information Security
The primary objective of the present work is to develop a system which preserves the location privacy of the concerned individual. ...
LBS providers require user's current locations to answer their location-based queries. ...
in maximum location privacy for secure communication. ...
doi:10.5815/ijcnis.2013.01.02
fatcat:6llolktkbnhzjehbezlyhlztpu
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
2013
IEEE Transactions on Information Forensics and Security
However, privacy of data location and data consumer can still be inferred from metadata (such as query and access control rules) exchanged within the IBS, but little attention has been put on its protection ...
Today's organizations raise an increasing need for information sharing via on-demand access. ...
We choose the finestgranularity automaton segmentation (each XPath step of an ACR is partitioned as one segment and kept at one coordinator) for maximum privacy preserving. ...
doi:10.1109/tifs.2013.2247398
fatcat:4ozusth2qzfvrox3ecwtxvogva
Ïnfïnïty
2007
Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access - MobiDE '07
Ïnfïnïty enables information sharing and collaboration among mobile devices in a privacy-preserving manner. ...
Personal mobile devices, such as cell phones and PDAs, are undergoing continual improvements in computing power, storage, and connectivity. ...
The authors would like to thank Rakesh Agrawal, Karin Kailing, and Jerry Kiernan for initial discussions on the work and Leonard Lee, Eva Shon, Yong Yao and Ian Yap for implementing the prototype of the ...
doi:10.1145/1254850.1254856
dblp:conf/mobide/CheungGJS07
fatcat:6n7za4xscfhhdewkqxrixszgnm
Automaton segmentation
2007
Proceedings of the 14th ACM conference on Computer and communications security - CCS '07
However, little attention has been drawn on privacy of data and metadata stored and exchanged within DIBS. ...
Through an innovative automaton segmentation scheme, distributed access control enforcement, and query segment encryption, our system integrates security enforcement and query forwarding while preserving ...
segment and kept at one coordinator) for maximum privacy preserving. ...
doi:10.1145/1315245.1315308
dblp:conf/ccs/LiLLLC07
fatcat:xoa5cwjyifdirjvx7whdascilu
Deloc: a delegation-based privacy-preserving mechanism for location-based services
2021
International Journal of Mobile Communications
We present in this paper Deloc, a novel location privacy protection mechanism founded on the idea of preserving location privacy without altering geographical coordinates. ...
Moreover, with smartphone ownership growth, getting one's location became easier, and the privacy-related issues became almost inescapable. ...
For instance, unlike sporadic queries, the use on continuous LBS queries (e.g., navigation services) requires real-time accurate location data. ...
doi:10.1504/ijmc.2021.111895
fatcat:w5qhy6y7ozfbdh7ubbj2adhq44
« Previous
Showing results 1 — 15 out of 8,778 results