2011
DOI: 10.1109/tdsc.2009.25
|View full text |Cite
|
Sign up to set email alerts
|

An Obfuscation-Based Approach for Protecting Location Privacy

Abstract: The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns are increasing and call for sophisticated solutions able to guarantee different levels of location privacy to the users. In this paper, we address this problem and present a solution based on diffe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
139
0
2

Year Published

2013
2013
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 222 publications
(145 citation statements)
references
References 25 publications
(39 reference statements)
0
139
0
2
Order By: Relevance
“…Location privacy has been studied over the past decade along two orthogonal dimensions: spatial cloaking through location k-anonymity represented by [17,26,7,32,13,6] and mix-zone based privacy protection and its variations represented by [9,15,16,11,29,25]. However, these approaches are suitable only for snapshot queries and are inadequate and ineffective for protecting location privacy of mobile users with continuous query services.…”
Section: Related Workmentioning
confidence: 99%
“…Location privacy has been studied over the past decade along two orthogonal dimensions: spatial cloaking through location k-anonymity represented by [17,26,7,32,13,6] and mix-zone based privacy protection and its variations represented by [9,15,16,11,29,25]. However, these approaches are suitable only for snapshot queries and are inadequate and ineffective for protecting location privacy of mobile users with continuous query services.…”
Section: Related Workmentioning
confidence: 99%
“…Among the most popular techniques to protect user's location, the obfuscation gained much interest [1,2,10,19]. Location obfuscation is the process of degrading the quality of information about a person's location, with the aim of protecting that person's location privacy [1,4]. In [1,11], the authors propose obfuscation techniques by enlarging, shifting, and reducing the area containing real user's location.…”
Section: Location Obfuscationmentioning
confidence: 99%
“…Location obfuscation is the process of degrading the quality of information about a person's location, with the aim of protecting that person's location privacy [1,4]. In [1,11], the authors propose obfuscation techniques by enlarging, shifting, and reducing the area containing real user's location. However, these obfuscation techniques just deal with geometry of the obfuscated region, not concern about what are included inside.…”
Section: Location Obfuscationmentioning
confidence: 99%
See 1 more Smart Citation
“…Location privacy has been studied over the past decade along two orthogonal dimensions: spatial cloaking through location k-anonymity represented by [20,31,9,40,15,8] and mix-zone based privacy protection and its variations represented by [11,18,19,13,34,30]. Some of them had identified the additional vulnerability of location disclosure due to mobile users traveling on spatially constrained road networks [40,34].…”
Section: Related Workmentioning
confidence: 99%