Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society 2009
DOI: 10.1145/1655188.1655204
|View full text |Cite
|
Sign up to set email alerts
|

Faking contextual data for fun, profit, and privacy

Abstract: The amount of contextual data collected, stored, mined, and shared is increasing exponentially. Street cameras, credit card transactions, chat and Twitter logs, e-mail, web site visits, phone logs and recordings, social networking sites, all are examples of data that persists in a manner not under individual control, leading some to declare the death of privacy. We argue here that the ability to generate convincing fake contextual data can be a basic tool in the fight to preserve privacy. One use for the techn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0
1

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 94 publications
(66 citation statements)
references
References 10 publications
0
65
0
1
Order By: Relevance
“…The study provides insights into the deiciencies of existing solutions however, it did not analyze and compare the techniques quantitatively. Another study by Chow et al [8] proposed two features that could be used to diferentiate TMN dummy queries from real user queries.…”
Section: Related Workmentioning
confidence: 99%
“…The study provides insights into the deiciencies of existing solutions however, it did not analyze and compare the techniques quantitatively. Another study by Chow et al [8] proposed two features that could be used to diferentiate TMN dummy queries from real user queries.…”
Section: Related Workmentioning
confidence: 99%
“…Many location obfuscation mechanisms have been proposed, including reducing the granularity of the location (generalization), adding noise to the geographical location, adding fake location information, hiding location information, and changing identifiers [1], [4], [11], [15], [17].…”
Section: B Location Obfuscationmentioning
confidence: 99%
“…After agreeing with the privacy and data use policies 4 , they were asked to log in to their Foursquare account and grant us access to their check-ins and friend lists. After this step, our application verified if the participants actually fulfilled the admission criteria and, if so, it allowed them to continue to the first (static) set of questions.…”
Section: B Online Surveymentioning
confidence: 99%
“…But generating effective dummy queries that divert the adversary is a difficult task [9], as they need to look like actual queries over space and time. An optimum algorithm for generating dummy queries is an open problem.…”
Section: Related Workmentioning
confidence: 99%