DOI: 10.1007/978-3-540-85654-2_19
|View full text |Cite
|
Sign up to set email alerts
|

Tracking Moving Objects in Anonymized Trajectories

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…One application of PS systems is to support the urban and transportation planning process inferring the most popular travel routes in a city and understanding the human travel behavior [39,40,41]. Therefore, PS systems have generated significant interest in the collection of spatio-temporal data for moving objects [42,43]. However, the availability of such data at a centralized location raises concerns regarding the privacy of mobile device clients since an adversary could use a trajectory-estimation method over such data in order to compromise the users' privacy [21,44,45].…”
Section: Privacy Protection Analysis: the Historical Casementioning
confidence: 99%
See 2 more Smart Citations
“…One application of PS systems is to support the urban and transportation planning process inferring the most popular travel routes in a city and understanding the human travel behavior [39,40,41]. Therefore, PS systems have generated significant interest in the collection of spatio-temporal data for moving objects [42,43]. However, the availability of such data at a centralized location raises concerns regarding the privacy of mobile device clients since an adversary could use a trajectory-estimation method over such data in order to compromise the users' privacy [21,44,45].…”
Section: Privacy Protection Analysis: the Historical Casementioning
confidence: 99%
“…Recall that the adversary has access to privacy-protected data, then he may have access to modified or non-modified data based on the privacy-preserving mechanism applied in the system. In the case of a PS system using an non-attribute-modification mechanism, the adversary has access to the actual location, and he might use a traditional tracking algorithm in order to reconstruct the participant's trajectory [42]. In the case of an attribute-modification mechanism, the adversary does not have access to actual but a modified location, therefore, he needs to estimate the location where each record was generated as well as the records that belongs to the same trajectory.…”
Section: Privacy Protection Analysis: the Historical Casementioning
confidence: 99%
See 1 more Smart Citation