Filters








1,543 Hits in 6.8 sec

Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy

Gabriel Ghinita
2009 TRANSACTIONS ON DATA PRIVACY   unpublished
In this survey paper, we give an overview of the state-of-the-art in location privacy protection from the dual perspective of query privacy and trajectory anonymization.  ...  Currently, two main LBS use scenarios exist: in the first one, users send location-based queries to an un-trusted server, and the privacy objective is to protect the location of the querying user.  ...  In this paper, we provide a dual perspective on location privacy, by studying the two most prominent location-based application scenarios: private location queries and anonymous publication of trajectories  ... 
fatcat:fass5tphkjctjmb7udbxv2p5ee

2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services

Haibo Hu, Jianliang Xu
2010 IEEE Transactions on Parallel and Distributed Systems  
Xu and Cai recently studied location cloaking based on historical trajectories for continuous location-based services [31] and mobile ad-hoc networks [32] .  ...  A grid-based cloaking algorithm was suggested on the anonymizer for both the K-anonymity and granularity metrics. Chow et al. studied location cloaking in a peer-to-peer environment [9] .  ...  His research interests include mobile and wireless data management, location-based services, and privacy-aware computing.  ... 
doi:10.1109/tpds.2010.26 fatcat:4zmpexv7lra6fpebw4wujjpqae

Privacy for 5G-Supported Vehicular Networks

Meng Li, Liehuang Zhu, Zijian Zhang, Chhagan Lal, Mauro Conti, Fabio Martinelli
2021 IEEE Open Journal of the Communications Society  
Unfortunately, 5GVN are still confronted with a variety of privacy threats. Such threats are targeted at users' data, identity, location, and trajectory.  ...  data (e.g., identity, location, and trajectory) collection from vehicular users.  ...  Riders are first scheduled to a driver group by a jointly differentially private optimization process according to the private dual decomposition [189] .  ... 
doi:10.1109/ojcoms.2021.3103445 fatcat:cznswnoczrb4dgfg7hhiywifpe

Obfuscation At-Source

Thivya Kandappu, Archan Misra, Shih-Fen Cheng, Randy Tandriansyah, Hoong Chuin Lau
2018 Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies  
More specically, we show that one can increase its location entropy by 23% with only modest changes to the real trajectories while imposing an additional 24% (< 1 min) of detour overhead on average.  ...  and global uniqueness of locations).  ...  in entropy (i.e., (H )  0). 5.5.1 k-Anonymity. k-anonymity is a trajectory anonymization technique that groups k co-localized trajectories (i.e., the trajectories that share the same spatial locations  ... 
doi:10.1145/3191748 fatcat:yzfqwtyrojg43hm2eyy4rogj2i

Differential Privacy Techniques for Cyber Physical Systems: A Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
2019 arXiv   pre-print
In order to make CPSs data more secure, certain privacy preservation strategies such as encryption, and k-anonymity have been presented in the past.  ...  Meanwhile, differential privacy emerged as an efficient technique to protect CPSs data privacy. In this paper, we present a comprehensive survey of differential privacy techniques for CPSs.  ...  One such effort is carried out in [217] , the authors developed a differentially private vehicular trajectory protection algorithm in which they explored and integrated exponential differential privacy  ... 
arXiv:1812.02282v3 fatcat:bnapnprldnaetjnjedz473lrme

DIFFERENTIAL PRIVACY FOR IOT-ENABLED CRITICAL INFRASTRUCTURE: A COMPREHENSIVE SURVEY

Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, Robin Doss, Mike J. Ryan
2021 IEEE Access  
This paper provides a comprehensive and extensive survey of the application and implementation of differential privacy in four major application domains of IoT-enabled critical infrastructure: Smart Grids  ...  In the past, researchers have employed several privacy preservation approaches including cryptographic encryption and k-anonymity to secure IoT-enabled critical infrastructure.  ...  On the other hand, choosing a large -value inputs a small amount of noise and guarantees data utility and query accuracy while compromising on privacy.  ... 
doi:10.1109/access.2021.3124309 fatcat:vejtyjyrwffeffi7ob2o2svyja

A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients

Vasile C. Perta, Marco V. Barbera, Gareth Tyson, Hamed Haddadi, Alessandro Mei
2015 Proceedings on Privacy Enhancing Technologies  
Commercial Virtual Private Network (VPN) services have become a popular and convenient technology for users seeking privacy and anonymity.  ...  However, as of yet, the claims made by these providers have not received a sufficiently detailed scrutiny. This paper thus investigates the claims of privacy and anonymity in commercial VPN services.  ...  Acknowledgements We would like to thank our shepherd, Paul Syverson, and the anonymous reviewers for their insightful comments and suggestions.  ... 
doi:10.1515/popets-2015-0006 dblp:journals/popets/PertaBTHM15 fatcat:mpw3p4adrfb45mh6rjqa3j2hw4

Privacy-preserving Crowd-sensing for Dynamic Spectrum Access with Malicious Workers

Erald Troja, Nikhil Yadav, Ice Lin, Nhie U. Diep
2021 IEEE Access  
A querying user will rely on the k-anonymity paradigm as follows.  ...  Hence, we choose to provide location privacy for the querying user through the concept of k-anonymity [12] by obfuscating the plaintext query instead.  ... 
doi:10.1109/access.2021.3057322 fatcat:ncmhvm5kg5fuxhos5cff72hrw4

Privacy Preserving Scheme for Location-Based Services

Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib
2012 Journal of Information Security  
Using homomorphic encryption schemes, a Location-Based Service (LBS) can process encrypted inputs to retrieve encrypted location-related information.  ...  However, the protection of users' privacy achieved through this technology makes it attractive for more research and enhancing.  ...  [8] and You et al. [9] have proposed a new technique to hide users' location and trajectory by sending several queries instead of only one.  ... 
doi:10.4236/jis.2012.32013 fatcat:tqb2b5qi2vaqblod2l4imozqjm

Prophet: A Context-Aware Location Privacy-Preserving Scheme in Location Sharing Service

Jiaxing Qu, Guoyin Zhang, Zhou Fang
2017 Discrete Dynamics in Nature and Society  
However, location sharing may introduce a new class of privacy threats ranging from localizing an individual to profiling and identifying him based on the places he shared.  ...  Then, we propose a novel location anonymization mechanism, which adopts a ε-indistinguishability strategy to protect user's sensitive location information published.  ...  Similarly, when receiving the query with a certain anonymous space region, LBS provider just processes the user's query without learning the related privacy information from the anonymous space region  ... 
doi:10.1155/2017/6814832 fatcat:5qy3256tqngyrfln57vpmqepc4

2019 Index IEEE Transactions on Knowledge and Data Engineering Vol. 31

2020 IEEE Transactions on Knowledge and Data Engineering  
., +, TKDE March 2019 423-436 Divide and conquer methods Parallel Trajectory-to-Location Join.  ...  ., +, TKDE Dec. 2019 2393-2406 Data privacy A Utility-Optimized Framework for Personalized Private Histogram Estimation.  ... 
doi:10.1109/tkde.2019.2953412 fatcat:jkmpnsjcf5a3bhhf4ian66mj5y

A planetary nervous system for social mining and collective awareness

F. Giannotti, D. Pedreschi, A. Pentland, P. Lukowicz, D. Kossmann, J. Crowley, D. Helbing
2012 The European Physical Journal Special Topics  
Trusted networks and privacy-aware social mining is aimed at creating a new deal around the questions of privacy and data ownership empowering individual persons with full awareness and control on own  ...  mining, and the idea of trust networks and privacy-aware social mining.  ...  The authors are indebted with many people for inspiring discussions, contributions, comments and criticisms, and remarkably: Andrzej Nowak, John Shawe- Taylor  ... 
doi:10.1140/epjst/e2012-01688-9 fatcat:4bjj4ukpzvhd5fhpt2xnf45eli

Privacy-Preserving Task Assignment in Spatial Crowdsourcing

An Liu, Zhi-Xu Li, Guan-Feng Liu, Kai Zheng, Min Zhang, Qing Li, Xiangliang Zhang
2017 Journal of Computer Science and Technology  
In this paper, we study the problem of assigning workers to tasks in a way that location privacy for both workers and task requesters is preserved.  ...  Through extensive experiments on two real-world datasets, we demonstrate the efficiency and effectiveness of our protocols.  ...  On the other hand, users can only get a limited location data for their queries, thus protecting the server's private data. Liu et al.  ... 
doi:10.1007/s11390-017-1772-5 fatcat:ovdmrhvocbfjterd6ac2o2aigq

Differential Privacy for Industrial Internet of Things: Opportunities, Applications and Challenges [article]

Bin Jiang, Jianqiang Li, Guanghui Yue, Houbing Song
2021 arXiv   pre-print
In this paper, we conduct a comprehensive survey on the opportunities, applications and challenges of differential privacy in IIoT.  ...  We firstly review related papers on IIoT and privacy protection, respectively.  ...  Zhu et al. provided a structured survey on differentially private data publishing and analysis [22] .  ... 
arXiv:2101.10569v2 fatcat:xwebjbcvcjhbbaehajhdfjocia

Digital Earth Ethics [chapter]

Yola Georgiadou, Ourania Kounadi, Rolf A. de By
2019 Manual of Digital Earth  
(Geo)privacy is a claim of individuals to determine for themselves when, how, and to what extent location information about them is communicated to others.  ...  First, we focus on (geo)privacy because information about an individual's location is substantially different from other personal information.  ...  Our colleague Marga Koelen continues to be a marvelous traveling companion into the land of ethics and location privacy.  ... 
doi:10.1007/978-981-32-9915-3_25 fatcat:qjesod5vwvbdpcky2b6notw5hq
« Previous Showing results 1 — 15 out of 1,543 results