Proceedings of the Sixteenth Annual International Conference on Mobile Computing and Networking 2010
DOI: 10.1145/1859995.1860017
|View full text |Cite
|
Sign up to set email alerts
|

Privacy vulnerability of published anonymous mobility traces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
72
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 84 publications
(72 citation statements)
references
References 16 publications
0
72
0
Order By: Relevance
“…Second, although dummy locations can be used to achieve k-anonymity, how to select these locations is a challenge. Most of the existing approaches [6], [7], [8], [4], [9] assume that the adversary has no side information [10], [11], such as user's query probability related to location and time, and information related to the semantics of the query such as the gender and social status of the user, and then dummy locations are generated based on a random walk model [7], [4], or virtual circle/grid model [9]. Since some adversary (e.g., the LBS server) may have such side information, these dummy generation algorithms may not work well.…”
Section: Introductionmentioning
confidence: 99%
“…Second, although dummy locations can be used to achieve k-anonymity, how to select these locations is a challenge. Most of the existing approaches [6], [7], [8], [4], [9] assume that the adversary has no side information [10], [11], such as user's query probability related to location and time, and information related to the semantics of the query such as the gender and social status of the user, and then dummy locations are generated based on a random walk model [7], [4], or virtual circle/grid model [9]. Since some adversary (e.g., the LBS server) may have such side information, these dummy generation algorithms may not work well.…”
Section: Introductionmentioning
confidence: 99%
“…To assign a corresponding range in the 1-d space for each base cell, we Input: the T obtained from Algorithm 1, starting point 0 and curve orientation Output: a updated quad-tree root node T (1) initializes S(T) = 0 , (T)= , m = 0; (2) push T into the stack; (3) while (stack is not empty) do (4) N = pop the top element from the stack (5) if (N has child node) then (6) for (i= sw, se, ne, nw) do (7) set S(N i ), and (N i ) (8) push N i into the stack (9) end for (10) else (11) ℎ N = m (12) set the values of all corresponding POIs in the node N as m (13) m = m + 1 (14) end if (15) end while (16) outputs the updated quad-tree root node T.…”
Section: Modified Hilbert Curve Fillingmentioning
confidence: 99%
“…To address the privacy issues for mobile users in LBSs, a variety of privacy-preserving mechanisms and metrics have been proposed to allow users to make use of the LBSs while mitigating privacy concerns over the past few years [3][4][5][6][7][8][9][10][11][12][13][14][15]. These LBS privacy protection mechanisms (LPPMs) provide different privacy-utility trade-off, which offer alternatives to better meet personal requirements of different mobile users.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations