Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems 2009
DOI: 10.1145/1653771.1653807
|View full text |Cite
|
Sign up to set email alerts
|

Preventing velocity-based linkage attacks in location-aware applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
85
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 95 publications
(85 citation statements)
references
References 12 publications
0
85
0
Order By: Relevance
“…A variety of approaches have been proposed to overcome privacy protection related challenges. Many depend on specific scenarios and basic privacy attributes such as the mobile user's identity, his current location, and time information [9]. For instance, a mobile user, who is at an unknown and unimportant location, may have no issue in sharing his personal data.…”
Section:  What If the Mobile User's Location Is Revealed?mentioning
confidence: 99%
See 2 more Smart Citations
“…A variety of approaches have been proposed to overcome privacy protection related challenges. Many depend on specific scenarios and basic privacy attributes such as the mobile user's identity, his current location, and time information [9]. For instance, a mobile user, who is at an unknown and unimportant location, may have no issue in sharing his personal data.…”
Section:  What If the Mobile User's Location Is Revealed?mentioning
confidence: 99%
“…They take advantage of the rare case in k-anonymity, where a sensitive value is indistinguishable and posted along a set of k-cluster values. Despite the dataset being k-anonymized, the sensitive value is revealed by any adversary [8], [9]. Additional homogeneity attacks include map utilization by reducing the area.…”
Section: ) Location Homogenity Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The problem of location privacy has been well studied in the context of location-based services (Rossi et al, 2015;Olumofin and Tysowski, 2010;Gruteser and Grunwald, 2003;Ghinita and Damiani, 2009;Damiani et al, 2010;Hwang et al, 2014;Ghinita and Damiani, 2009;Ghinita, 2013;Jin et al, 2010), but mainly with a focus on on-line, service-focused anonymity. In this paper, we consider off-line and data-focused anonymity, as in the context of data publishing.…”
Section: Relatad Workmentioning
confidence: 99%
“…To reduce the computational complexity and improve the service quality, algorithms based on disturbance were proposed [7,11,12]. In this type, algorithms usually disturb the real location by other k-1 users with the help of a trusted third party (TTP) to achieve k-anonymity [13].…”
Section: Introductionmentioning
confidence: 99%