2022
DOI: 10.3390/s22020687
|View full text |Cite
|
Sign up to set email alerts
|

Perturbed-Location Mechanism for Increased User-Location Privacy in Proximity Detection and Digital Contact-Tracing Applications

Abstract: Future social networks will rely heavily on sensing data collected from users’ mobile and wearable devices. A crucial component of such sensing will be the full or partial access to user’s location data, in order to enable various location-based and proximity-detection-based services. A timely example of such applications is the digital contact tracing in the context of infectious-disease control and management. Other proximity-detection-based applications include social networking, finding nearby friends, opt… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 45 publications
0
3
0
Order By: Relevance
“…A range of privacy-preserving techniques have been developed and added onto the basic federated learning framework, including differential privacy (DP) on the mobiles and/or the server [ 27 , 34 ], secure aggregation [ 7 , 25 ], etc. The state-of-the-art technique for adding carefully calibrating noise [ 13 , 40 ] is DP, including central DP [ 45 ] and local DP.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A range of privacy-preserving techniques have been developed and added onto the basic federated learning framework, including differential privacy (DP) on the mobiles and/or the server [ 27 , 34 ], secure aggregation [ 7 , 25 ], etc. The state-of-the-art technique for adding carefully calibrating noise [ 13 , 40 ] is DP, including central DP [ 45 ] and local DP.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, even in a Federated KDE setting where users’ data is not directly disclosed, a malicious server can still infer users’ locations, by querying users for local density information and using it to deduce their most probable locations. A range of privacy-preserving techniques have been developed and added onto the basic federated learning and analytics frameworks, including differential privacy (DP) on the mobiles and/or the server [ 16 , 27 , 34 ], secure aggregation [ 7 , 15 ], and combinations thereof [ 25 ], [ 3 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Location-based tracing is used for identifying the groups or individuals that have been at an outbreak location at a particular time [13]. As dimensions of distance between person-to-person are not used, location-based tracing is not able to efficiently detect close contacts but rather utilizes the probability that these groups will be infected due to their close proximity to the scene [14]. In fulfilling the probability, data such as location, time, user ID, and many others are being collected.…”
Section: -1-defining Close Contact Tracing and Location-based Tracingmentioning
confidence: 99%
“…The topical theme of user device location privacy is explored in the paper “Perturbed-Location Mechanism for Increased User-Location Privacy in Proximity Detection and Digital Contact-Tracing Applications” by Lohan et al [ 12 ], which presents perturbation-based location privacy protection, applied to location-based and proximity-based services (e.g., COVID-19 contact tracing). The approach is validated with simulation-based results in multi-floor building scenarios, enabling devices to adjust the accuracy level for location sharing with service providers.…”
mentioning
confidence: 99%