2017
DOI: 10.1155/2017/7576307
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy Leakage through Sensory Data

Abstract: Mobile devices bring benefits as well as the risk of exposing users' location information, as some embedded sensors can be accessed without users' permission and awareness. In this paper, we show that, only by using the data collected from the embedded sensors in mobile devices instead of GPS data, we can infer a user's location information with high accuracy. Three issues are addressed which are route identification, user localization in a specific route, and user localization in a bounded area. The Dynamic T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 43 publications
(20 citation statements)
references
References 29 publications
0
20
0
Order By: Relevance
“…For example, whether two individuals in a social network have a close relationship may be expected to be kept a secret. Therefore, privacy concerns have been raised in increasingly emerging technologies [2][3][4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…For example, whether two individuals in a social network have a close relationship may be expected to be kept a secret. Therefore, privacy concerns have been raised in increasingly emerging technologies [2][3][4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…Data privacy mainly focuses on the content of the data submitted by DPs. Its importance lies in that data collected through MCS is usually sensitive to DPs, based on which it is easy for an entity to infer private information, such as the location [47], trajectory, etc. But at the same time, usability should be preserved.…”
Section: ) Data Privacymentioning
confidence: 99%
“…Although this technology provides great benefits, sensitive and private information mined from raw data (e.g., social relationships and financial transactions) is also exposed to the risk of disclosure [6]. For example, more than 400, 000 electronic eyes in Beijing may lead to privacy leakage (e.g., vehicle location information) by data sharing in vehicular ad hoc networks (VANETs) [18,30,32]. Similarly, we can also illegal access personal health datasets gathered from various sensors of physical sign in body sensor networks (BSNs) and publish these private data without permission [34].…”
Section: (Communicated By Zhipeng Cai)mentioning
confidence: 99%