Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks 2008
DOI: 10.1145/1460877.1460898
|View full text |Cite
|
Sign up to set email alerts
|

Location privacy based on trusted computing and secure logging

Abstract: Many operators of cellphone networks now offer locationbased services to their customers, whereby an operator often outsources service provisioning to a third-party provider. Since a person's location could reveal sensitive information about the person, the operator must ensure that the service provider processes location information about the operator's customers in a privacy-preserving way. So far, this assurance has been based on a legal contract between the operator and the provider. However, there has bee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…In [19], 'Chaums Blind Signature' is used to achieve anonymity and privacy. In [32], the public key encryption process is used with the concept of a trusted computing module. In [40], User's privacy is preserved by a telecommunication service provider (TSP) through the exchange of encrypted feedback scores to the public bulletin board for other TSPs instead of private information exchange.…”
Section: Related Workmentioning
confidence: 99%
“…In [19], 'Chaums Blind Signature' is used to achieve anonymity and privacy. In [32], the public key encryption process is used with the concept of a trusted computing module. In [40], User's privacy is preserved by a telecommunication service provider (TSP) through the exchange of encrypted feedback scores to the public bulletin board for other TSPs instead of private information exchange.…”
Section: Related Workmentioning
confidence: 99%
“…In [25], trusted computing and secure logging were used to preserve location privacy. The paper addressed the inefficiency of PIR by adopting an alternative solution that requires the Trusted Module to cloak a user's location before accessing the POI database.…”
Section: Pir-based Location Privacymentioning
confidence: 99%
“…Alternatively, G. Ghinita [17,18] who exp Private Information Retrieval ( location-specific information is claimed that Anonymizers are n theory known as Computation approximate and exact neare interests (POI). It also could snapshot and the first to provi against correlation attacks.…”
Section: B Anonymization Techniquesmentioning
confidence: 99%