The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
Proceedings of the 20th International Conference on Advances in Geographic Information Systems 2012
DOI: 10.1145/2424321.2424354
|View full text |Cite
|
Sign up to set email alerts
|

A dummy-based anonymization method based on user trajectory with pauses

Abstract: A variety of services utilizing users' positions have become available because of rapid advances in Global Positioning System (GPS) technologies. Since location information may reveal private information, preserving location privacy has become a significant issue. We proposed a dummy-based method of anonymizing location to protect this privacy in our previous work that generated dummies based on various restrictions in a real environment. However, the previous work assumed a simplified mobility model in which … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 73 publications
(54 citation statements)
references
References 20 publications
0
54
0
Order By: Relevance
“…The authors in [112], [113] propose dummy-based privacypreserving techniques which are based on assumptions that the movement plan of the user is known in advance. In a more realistic and refined approach [31], they propose a dummybased privacy-preserving technique to anonymize the location of users in real environments.…”
Section: ) Dummy-based Techniques In Mobile Networkmentioning
confidence: 99%
“…The authors in [112], [113] propose dummy-based privacypreserving techniques which are based on assumptions that the movement plan of the user is known in advance. In a more realistic and refined approach [31], they propose a dummybased privacy-preserving technique to anonymize the location of users in real environments.…”
Section: ) Dummy-based Techniques In Mobile Networkmentioning
confidence: 99%
“…Privacy Enhanced Trusted location based services (PE-TLBS) [18] focus to implement a simple protocol in which the user authenticate the server, while preserving anonymity and avoiding the possibility of their personal information leakage. The concept of dummy nodes proposes the use of dummy locations with the real location to protect the location privacy of the node [19]. The quality of requested service degrades when the number of dummy node increases.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This type of fashion makes privacy preservation of user collaboration no longer efficient, because they often submit queries with certain time delays. Thus, researchers have to go back to TTP for finding solutions and solutions of [1,3,4,7,9,10,26,27] are able to be classified into two categories: whole trajectory disturbance and subsequent locations generalization. As the adversary can obtain user's subtrajectory, algorithms of the whole trajectory disturbance are less suitable for continuous LBSs, so algorithms of subsequent locations generalization prosperous.…”
Section: Related Workmentioning
confidence: 99%
“…These algorithms can be classified into two main categories: the whole trajectory disturbance [1][2][3][4] and the subsequent location generalization [5][6][7][8][9][10]. As subtrajectories can be obtained before preserving, the adversary may infer the location correlation and identify the real trajectory from the anonymous group, which makes algorithms of whole trajectory disturbance failed.…”
Section: Introductionmentioning
confidence: 99%