8,778 Hits in 5.0 sec

On the Trade-Off between User-Location Privacy and Queried-Location Privacy in Wireless Sensor Networks [chapter]

Ryan Vogt, Mario A. Nascimento, Janelle Harms
2009 Lecture Notes in Computer Science  
Experiments reveal that how dispersed the k queries are has no effect on the privacy of the user's location.  ...  However, smaller k, randomized routing, and non-broadcast transmission improve the user's location privacy.  ...  This paper sheds some light on the trade-off between preserving the privacy of the queried and current locations simultaneously.  ... 
doi:10.1007/978-3-642-04383-3_18 fatcat:p45qmxmuprhazouqu2icwicwlq

A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services

William J. Buchanan, Zbigniew Kwecka, Elias Ekonomou
2012 Journal on spesial topics in mobile networks and applications  
This paper reviews some of the methods currently being proposed to reduce the impact of location tracking on user privacy, and presents a novel encryption method for preserving the location and trajectory  ...  While this type of information can be useful, when the offered services are trusted, it also introduces privacy issues relating to gathering of location information for non-trusted applications like locationbased  ...  Chow [5] suggests that many methods do not separate location privacy from query privacy, and proposes a mechanism which ensures privacy for both, for spaces with a large number of continuous queries.  ... 
doi:10.1007/s11036-012-0362-6 fatcat:w62elvcxnvho5iqcqo4plmme6a

Secure and Privacy Preserving Navigation in VANET

2016 International Journal of Science and Research (IJSR)  
In addition to message authentication and privacy preserving, our scheme also provide other necessary security requirements.  ...  routes of shorter traveling time.  ...  In [19] , an efficient social-tierassisted packet forwarding protocol STAP for achieving receiver-location privacy preservation in VANETs was proposed.  ... 
doi:10.21275/v5i3.nov162079 fatcat:efki4wscbfcg7gmgfkgi4oyaou


Muhammad Usman Ashraf
2019 International Journal of Advanced Research in Computer Science  
In current study, we have conducted a comprehensive survey on TTP privacy protecting techniques which are being used in LBS systems.  ...  Moreover, it is aimed to provide a promising roadmap to research and development communities for right selection of privacy approach.  ...  Route Server [20] handover the authentic and efficient results for position queries. To post a route query there are queries of Q set {q1, q2, q3 …..  ... 
doi:10.26483/ijarcs.v10i2.6396 fatcat:spktkotncnefneplzmc2a7ol2e

Preventing Restricted Space Inference in Online Route Planning Services

Florian Dorfmeister, Kevin Wiesner, Michael Schuster, Marco Maier
2015 Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services  
As suchlike leakage of personal information threatens a user's privacy and anonymity, this paper presents PrOSPR, a comprehensive approach for using current online route planning services in a privacy-preserving  ...  Using a map-based approach for creating cloaked regions for the start and destination addresses, our solution queries the online service for routes between subsets of points from these regions.  ...  To enable privacy-preserving route queries, suitable map extracts of the start and destination regions are determined by a trusted location obfuscator and can be downloaded from a map provider.  ... 
doi:10.4108/eai.22-7-2015.2260037 dblp:journals/sis/DorfmeisterWSM15 fatcat:vouazljclze27kzyxup6h7abq4

A Survey on Privacy Issues in Mobile Social Networks

Akshita Maradapu Vera Venkata Sai, Yingshu Li
2020 IEEE Access  
Due to the widespread nature of MSNs and the lack of effective privacy-preserving architecture makes them a target for several attacks by adversaries and the users of the networks are completely vulnerable  ...  This survey on privacy issues in MSNs serves as a way to provide an introduction to MSNs.  ...  Another differential privacy based solution for preserving location privacy is LPT-DPk [56] . In this work, Yin focus on persevering frequent location patterns.  ... 
doi:10.1109/access.2020.3009691 fatcat:prx2edw2mbd4dkvgmowag3svla

Location Based Privacy Preserving System for Smart Phones

R. Keerthana
2017 International Journal for Research in Applied Science and Engineering Technology  
This proposed system executed by efficiency privacy preserving based on location based service i.e., (LBS).The user identify specific location nearest user need to reach that location within time, accurate  ...  Location based provider collection all query latency of user specified location and send to cloud server with encrypt user privacy data.  ...  However, solutions designed primarily based on coordinate transformation would be susceptible to best-known sample attacks. 2) Privacy-Preserving POI Query Based on PIR: As so much as we all know, solely  ... 
doi:10.22214/ijraset.2017.3088 fatcat:ml5s7hgij5cp5ayeijhc6jeofi

In-Network Trajectory Privacy Preservation

Mingming Guo, Xinyu Jin, Niki Pissinou, Sebastian Zanlongo, Bogdan Carbunar, S. S. Iyengar
2015 ACM Computing Surveys  
However, location trajectory privacy concerns hinder the adoptability of such applications.  ...  In this article, we survey existing trajectory privacy work in the context of wireless sensor networks, location-based services, and geosocial networks.  ...  Location-aware devices continuously/periodically transmit data tagged with spatial and temporal coordinates, known as "trajectory information."  ... 
doi:10.1145/2818183 fatcat:hgc33wgqlrdnpll6bodpe7y5mm

Privacy preservation in wireless sensor networks: A state-of-the-art survey

Na Li, Nan Zhang, Sajal K. Das, Bhavani Thuraisingham
2009 Ad hoc networks  
We also discuss a number of important open challenges for future research. Our hope is that this paper sheds some light on a fruitful direction of future research for privacy preservation in WSNs.  ...  This paper provides a state-of-theart survey of privacy-preserving techniques for WSNs.  ...  The unique challenges for privacy preservation in WSNs call for the development of effective privacy-preserving techniques.  ... 
doi:10.1016/j.adhoc.2009.04.009 fatcat:v2daasfks5dijhqnledvfjdcgy

A Privacy-Preserving Social P2P Infrastructure for People-Centric Sensing

Michael Dürr, Kevin Wiesner, Marc Herbstritt
2011 Networked Systems  
In this paper, we propose a protocol extension to our OSN design Vegas which enables secure, privacy-preserving, and trustful P2P communication between PCS participants.  ...  The rapid miniaturization and integration of sensor technologies into mobile Internet devices combined with Online Social Networks allows for enhanced sensor information querying, subscription, and task  ...  System Architecture In the following, we review parts of our OSN architecture developed in previous work before we present our P2P-based overlay query routing extension which allows for privacy-preserving  ... 
doi:10.4230/oasics.kivs.2011.176 dblp:conf/kivs/DurrW11 fatcat:n2vjdvnh3rdnlo64zbi7iosa3u

Hybrid Model for Location Privacy in Wireless Ad-Hoc Networks

IBalasaheb N. Jagdale, Nileema S. Gawande
2013 International Journal of Computer Network and Information Security  
The primary objective of the present work is to develop a system which preserves the location privacy of the concerned individual.  ...  LBS providers require user's current locations to answer their location-based queries.  ...  in maximum location privacy for secure communication.  ... 
doi:10.5815/ijcnis.2013.01.02 fatcat:6llolktkbnhzjehbezlyhlztpu

Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing

Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu
2013 IEEE Transactions on Information Forensics and Security  
However, privacy of data location and data consumer can still be inferred from metadata (such as query and access control rules) exchanged within the IBS, but little attention has been put on its protection  ...  Today's organizations raise an increasing need for information sharing via on-demand access.  ...  We choose the finestgranularity automaton segmentation (each XPath step of an ACR is partitioned as one segment and kept at one coordinator) for maximum privacy preserving.  ... 
doi:10.1109/tifs.2013.2247398 fatcat:4ozusth2qzfvrox3ecwtxvogva


Alvin Cheung, Tyrone Grandison, Christopher Johnson, Stefan Schönauer
2007 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access - MobiDE '07  
Ïnfïnïty enables information sharing and collaboration among mobile devices in a privacy-preserving manner.  ...  Personal mobile devices, such as cell phones and PDAs, are undergoing continual improvements in computing power, storage, and connectivity.  ...  The authors would like to thank Rakesh Agrawal, Karin Kailing, and Jerry Kiernan for initial discussions on the work and Leonard Lee, Eva Shon, Yong Yao and Ian Yap for implementing the prototype of the  ... 
doi:10.1145/1254850.1254856 dblp:conf/mobide/CheungGJS07 fatcat:6n7za4xscfhhdewkqxrixszgnm

Automaton segmentation

Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hsien Chu
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
However, little attention has been drawn on privacy of data and metadata stored and exchanged within DIBS.  ...  Through an innovative automaton segmentation scheme, distributed access control enforcement, and query segment encryption, our system integrates security enforcement and query forwarding while preserving  ...  segment and kept at one coordinator) for maximum privacy preserving.  ... 
doi:10.1145/1315245.1315308 dblp:conf/ccs/LiLLLC07 fatcat:xoa5cwjyifdirjvx7whdascilu

Deloc: a delegation-based privacy-preserving mechanism for location-based services

Zakaria Sahnoune, Esma Aïmeur
2021 International Journal of Mobile Communications  
We present in this paper Deloc, a novel location privacy protection mechanism founded on the idea of preserving location privacy without altering geographical coordinates.  ...  Moreover, with smartphone ownership growth, getting one's location became easier, and the privacy-related issues became almost inescapable.  ...  For instance, unlike sporadic queries, the use on continuous LBS queries (e.g., navigation services) requires real-time accurate location data.  ... 
doi:10.1504/ijmc.2021.111895 fatcat:w5qhy6y7ozfbdh7ubbj2adhq44
« Previous Showing results 1 — 15 out of 8,778 results