2017
DOI: 10.1561/3300000017
|View full text |Cite
|
Sign up to set email alerts
|

Methods for Location Privacy: A comparative overview

Abstract: The growing popularity of Location-Based Services, allowing for the collection of huge amounts of information regarding users' locations, has started raising serious privacy concerns. In this survey we analyze the various kinds of privacy breaches that may arise in connection with the use of location-based services, and we consider and compare some of the mechanisms and the metrics that have been proposed to protect the user's privacy, focusing in particular on the comparison between probabilistic spatial obfu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(26 citation statements)
references
References 62 publications
0
26
0
Order By: Relevance
“…Because most of these data are personal and confidential (e.g., location), there is a need for privacy-preserving techniques for processing and using these data. Location privacy is an emergency research topic [13,14] due to the ubiquity of LBSs. Within our context, using and/or sharing the exact location of an emergency raises many privacy issues.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Because most of these data are personal and confidential (e.g., location), there is a need for privacy-preserving techniques for processing and using these data. Location privacy is an emergency research topic [13,14] due to the ubiquity of LBSs. Within our context, using and/or sharing the exact location of an emergency raises many privacy issues.…”
Section: Discussionmentioning
confidence: 99%
“…For example, by knowing that one intervention took place in front of the house of a debilitated person, attackers with auxiliary information may accurately infer that this person received care and (mis)use this information for their own good. Indeed, location privacy is an emerging and active research topic in the literature [13][14][15] as publicly exposing users' location raises major privacy issues. A common way to achieve location privacy is by applying a location obfuscation mechanism.…”
Section: Introductionmentioning
confidence: 99%
“…Location privacy. Location privacy has been widely studied in the literature, and its survey can be found in [35]. A number of location obfuscation methods have been proposed so far, and they can be broadly divided into the following four types: perturbation (adding noise) [36,3,5], location generalization (merging regions) [37,38], and location hiding (deleting) [37,39], and adding dummy locations [40,41,42].…”
Section: Related Workmentioning
confidence: 99%
“…However, area cloaking is subject to triangulation attacks; if the user queries twice and obtains two different zones could reveal that the real location is close to the border between them …”
Section: Preliminary Knowledge and Related Workmentioning
confidence: 99%