Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing 2016
DOI: 10.1145/2971648.2971741
|View full text |Cite
|
Sign up to set email alerts
|

Location privacy for crowdsourcing applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(15 citation statements)
references
References 32 publications
0
15
0
Order By: Relevance
“…At a more abstract level, privacy has been identified as key property of tasks that deal with personal data, e.g., using images that show people or asking workers to share their position [Boutsis and Kalogeraki 2016]. But also information security and IP protection, that is, the protection of data and intellectual property (IP), are emerging quality attributes that affect a requester's willingness to crowdsource [Vukovic and Bartolini 2010].…”
Section: Terms and Conditionsmentioning
confidence: 99%
“…At a more abstract level, privacy has been identified as key property of tasks that deal with personal data, e.g., using images that show people or asking workers to share their position [Boutsis and Kalogeraki 2016]. But also information security and IP protection, that is, the protection of data and intellectual property (IP), are emerging quality attributes that affect a requester's willingness to crowdsource [Vukovic and Bartolini 2010].…”
Section: Terms and Conditionsmentioning
confidence: 99%
“…There are also efforts concentrate on decentralized privacy preserving approaches. Boutsis and Kalogeraki proposed a privacy preserving framework PROMPT based on the theory of coresets. The PROMPT allows users to evaluate their privacy leakage on their own devices, so users can decide whether to share their data accordingly.…”
Section: Preliminariesmentioning
confidence: 99%
“…Another focusing area is to increase anonymity of collected user location data [11], limiting shared location information, or evaluating privacy exposure level before sharing location data [12]. On the other hand, there are research works pointing out that because human mobility trace is very unique [17], even completed anatomized data can still be used to extract patterns and identify individuals [7][8][9].…”
Section: Related Workmentioning
confidence: 99%
“…To protect privacy, existing research works had focused on increasing anonymity of collected user location data [11], limiting shared location information, or evaluating privacy 2 Mobile Information Systems exposure level before sharing location data [12]. However how to protect privacy for mobile node's direct communication did not draw equal attention.…”
Section: Introductionmentioning
confidence: 99%