Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS 2009
DOI: 10.1145/1667502.1667511
|View full text |Cite
|
Sign up to set email alerts
|

Protecting location privacy against spatial inferences

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
31
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(31 citation statements)
references
References 16 publications
0
31
0
Order By: Relevance
“…Location privacy is broad range research topic, and various approaches have proposed to address the existing threats in current network environment. Location cryptographic 5,9,12 and location k-anonymity 6,10,11,13,16 are the two most popular location privacy preserving techniques. Wei et al 5 proposed to encrypt user's precise location before sending it to location-based server, and considered the location-based server as untrusted 3rd party, so generated and stored both precise and fake users' IDs and locations in the cellular tower.…”
Section: Related Workmentioning
confidence: 99%
“…Location privacy is broad range research topic, and various approaches have proposed to address the existing threats in current network environment. Location cryptographic 5,9,12 and location k-anonymity 6,10,11,13,16 are the two most popular location privacy preserving techniques. Wei et al 5 proposed to encrypt user's precise location before sending it to location-based server, and considered the location-based server as untrusted 3rd party, so generated and stored both precise and fake users' IDs and locations in the cellular tower.…”
Section: Related Workmentioning
confidence: 99%
“…Another technique of providing anonymity is to use k-anonymity techniques (Kulik et al, 2009;Chow and Mokbel, 2009;Ouyang et al, 2008;Damiani et al, 2009). In these solutions, a user will only upload the location of a region which contains k − 1 neighbours.…”
Section: Related Workmentioning
confidence: 99%
“…Recent studies have proposed methods for masking the identity [4,5], location [6][7][8], and query information [9] of users by using secure third-party anonymizers to encode the location of a user or POI. Anonymizers not only protect 2 Wireless Communications and Mobile Computing user privacy but also reduce communication time and costs.…”
Section: Introductionmentioning
confidence: 99%
“…These queries, which contain the same metadata, are transmitted to the LBS server. Another study [7] used a Hilbert curve to create an obfuscation area to mask the location of users. Anonymizers mask users by randomly selecting a representative user in proximity to a group of users.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation