2011
DOI: 10.1007/978-3-642-25280-8_14
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative Location Privacy with Rational Users

Abstract: Abstract. Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with their current coordinates. However, LBS providers collect a significant amount of data from mobile users and could be tempted to misuse it, by compromising a customer's location privacy (her ability to control the information about her past and present location). Many solutions to mitigate this privacy threat focus on changing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Collaborative Location Privacy Game (CLPG). In [33], it assumes that mobile users don't seek geographic information from the service provider, but get them from the neighbour users. If so, the user has no risk of privacy leakage.…”
Section: Oogmentioning
confidence: 99%
“…Collaborative Location Privacy Game (CLPG). In [33], it assumes that mobile users don't seek geographic information from the service provider, but get them from the neighbour users. If so, the user has no risk of privacy leakage.…”
Section: Oogmentioning
confidence: 99%
“…This leads to less communication with the service provider because a user contacts the provider only if there are no other users, with the requested information, in range. In this initial work no game theory is used but it is the basis for [12], where Santos et al extend their work by analyzing the collaborative behavior of users in MobiCrowd with gametheoretic methods. The two Nash game equilibria, which they have derived, favor mutual cooperation and mutual defection.…”
Section: Related Workmentioning
confidence: 99%
“…1) relies on a trusted agent, the anonymiser, to collect users' requests and anonymise them before sending them to LBS providers. However, in a distributed implementation users cooperate with each other to construct a generalised region [18,40]. The centralised framework is easy to implement and well-studied in the literature while the distributed framework requires more communications between collaborators and security analysis, e.g., with respect to insiders, is not well studied.…”
Section: Query Privacy and Request Generalisationmentioning
confidence: 99%