2017
DOI: 10.1515/popets-2017-0051
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Utility Improvement for Location Privacy

Abstract: Abstract:The continuously increasing use of locationbased services poses an important threat to the privacy of users. A natural defense is to employ an obfuscation mechanism, such as those providing geoindistinguishability, a framework for obtaining formal privacy guarantees that has become popular in recent years. Ideally, one would like to employ an optimal obfuscation mechanism, providing the best utility among those satisfying the required privacy level. In theory optimal mechanisms can be constructed via … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
89
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 53 publications
(90 citation statements)
references
References 40 publications
1
89
0
Order By: Relevance
“…6b), and thus achieve very low privacy. This experiment shows that training an optimal sporadic LPPM with location data from other users (e.g., [8]) is very dangerous from a privacy standpoint.…”
Section: A Experiments Sp: Sporadic Hardwired Lppmsmentioning
confidence: 98%
See 2 more Smart Citations
“…6b), and thus achieve very low privacy. This experiment shows that training an optimal sporadic LPPM with location data from other users (e.g., [8]) is very dangerous from a privacy standpoint.…”
Section: A Experiments Sp: Sporadic Hardwired Lppmsmentioning
confidence: 98%
“…We now describe a framework that instantiates the abstraction above. This framework extends ideas from [1], [8]. It consists of two steps: the design step, where the user designs Adversary's estimate of the real location x s using z r .…”
Section: B Design and Evaluation Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…There is, therefore, a growing interest in the development of mechanisms to protect location privacy during the use of LBSs. Most of the approaches in the literature are based on perturbing the user's location, see, for instance, [1,2,5,6]. Obviously, the perturbation must be done with care, in order to preserve the utility of the service.…”
Section: Introductionmentioning
confidence: 99%
“…RO is applied to the histogram H = (7, 2, 3, 2, 13, 12, 8, 3) inFigure 1a, using the target histogram H =(10,8,6,2,13,4,4,3) in…”
mentioning
confidence: 99%