2021
DOI: 10.1109/tkde.2019.2963312
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Spatiotemporal Event Privacy in Continuous Location-Based Services

Abstract: Location privacy-preserving mechanisms (LPPMs) have been extensively studied for protecting users' location privacy by releasing a perturbed location to third parties such as location-based service providers. However, when a user's perturbed locations are released continuously, existing LPPMs may not protect the sensitive information about the user's spatiotemporal activities, such as "visited hospital in the last week" or "regularly commuting between Address 1 and Address 2" (it is easy to infer that Addresse… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 31 publications
(19 citation statements)
references
References 37 publications
0
16
0
Order By: Relevance
“…be employed to protect user's location privacy in social distancing scenarios. In [135], a location privacy-preserving method leveraging spatio-temporal events of mobile users in continuous location-based services, e.g., office visitation, is investigated. Specifically, an -differential privacy is designed to protect spatio-temporal events against attackers by adding random noise to the event data [138]- [140].…”
Section: ) Location Information Protectionmentioning
confidence: 99%
“…be employed to protect user's location privacy in social distancing scenarios. In [135], a location privacy-preserving method leveraging spatio-temporal events of mobile users in continuous location-based services, e.g., office visitation, is investigated. Specifically, an -differential privacy is designed to protect spatio-temporal events against attackers by adding random noise to the event data [138]- [140].…”
Section: ) Location Information Protectionmentioning
confidence: 99%
“…Therefore, trajectory privacy [134], [135], [136] refers to location indistinguishability and trajectory indistinguishability. Given that locations are correlated [137], it is more difficult to protect trajectory privacy.…”
Section: Trajectory Privacymentioning
confidence: 99%
“…It is well-acknowledged to utilize differential privacy [121] to perturb the real location to a noisy one. However, enforcing differential privacy in 5GVN has to address three issues in real deployment, i.e., correlation with activity [137], repeated submission [199], [200], and utility. Similar to identity privacy, if the inner correlation with activity is exposed, users' locations are endangered.…”
Section: Location Privacymentioning
confidence: 99%
“…However, due to the lack of effective and safe data management, users' privacy is under the risk of leakage. Many research efforts have been devoted to investigating location privacy protection [3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%