Proceedings of the 14th ACM Conference on Computer and Communications Security 2007
DOI: 10.1145/1315245.1315266
|View full text |Cite
|
Sign up to set email alerts
|

Preserving privacy in gps traces via uncertainty-aware path cloaking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
217
0
1

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 252 publications
(218 citation statements)
references
References 30 publications
0
217
0
1
Order By: Relevance
“…Consequently, several anonymity notions and methods for trajectories have been proposed [21,20,22,7,37,6,1,33,43,31,34,47,32,2,23,24]. Among those works, we next review the ones that are most similar to our approach, and we highlight our comparative advantages.…”
Section: Trajectory Anonymizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Consequently, several anonymity notions and methods for trajectories have been proposed [21,20,22,7,37,6,1,33,43,31,34,47,32,2,23,24]. Among those works, we next review the ones that are most similar to our approach, and we highlight our comparative advantages.…”
Section: Trajectory Anonymizationmentioning
confidence: 99%
“…However, this work only considers sequential place visitation without real timestamps. If the adversary is assumed to use some prediction of continuation of a trajectory based on previous path and speed, then uncertainty-aware path cloaking [22,23] can suppress these trajectories; this however results in high information loss.…”
Section: Trajectory Anonymizationmentioning
confidence: 99%
“…Sampigethaya et al [28] use maximum tracking time to evaluate the location privacy of vehicles in VANET. Hoh et al [17] use the mean time to confusion to measure the privacy level of vehicles sending GPS traces in a traffic monitoring system. Fischer et al [8] propose to measure unlinkability of sender-message relations based on the outer and inner structures of the set partitions of the observed messages.…”
Section: Related Workmentioning
confidence: 99%
“…Hoh [11] proposed an uncertainty-aware path cloaking algorithm to hide location samples in a dataset. As processing delay is a significant impediment in this method, Meyerowitz [12] tries to resolve it by predicting which intersection the users will pass through, and proactively retrieve data of the user's locations.…”
Section: Full Trust Centralized Third Partymentioning
confidence: 99%
“…Furthermore, the locations visited by the vehicles can be associated with the places of interests [7] by firstly accumulating the driving paths, then by cross-referencing the accumulation results with geographical maps or other location based services. Existing methodologies to enhance location privacy can be classified into several categories: k-anonymity [8][9][10], path confusion [11,12], and Mix-Zones [13,14]. These approaches are either of the type of centralized or partially centralized control and present two obvious drawbacks.…”
Section: Introductionmentioning
confidence: 99%