Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services 2019
DOI: 10.1145/3360774.3360800
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying location privacy in permissioned blockchain-based internet of things (IoT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…These entities usually act as certificate authorities that release public and private keys to access the ledger [26]. Obviously, such a solution requires to trust such consortium [27]. In contrast, we think that a permissionless approach, such as Ethereum and IOTA DLTs, is more suitable to let every individual share his data and enjoy services.…”
Section: ) Distributed Ledger Technologiesmentioning
confidence: 99%
See 1 more Smart Citation
“…These entities usually act as certificate authorities that release public and private keys to access the ledger [26]. Obviously, such a solution requires to trust such consortium [27]. In contrast, we think that a permissionless approach, such as Ethereum and IOTA DLTs, is more suitable to let every individual share his data and enjoy services.…”
Section: ) Distributed Ledger Technologiesmentioning
confidence: 99%
“…With respect to the two previous approaches, zk-PoL introduces the concept of privacy, since it demonstrates that a user is within a certain area, without revealing the exact position of the user. Examples of proof-of-location protocols that enhance location privacy are shown in Platin [77] and in [27].…”
Section: ) Data Authenticity For Proof Of Locationmentioning
confidence: 99%
“…Another popular solution is the Spatial Obfuscation which replaces user's real location with a larger CR. 4,7,10,22,[28][29][30][31][32] Earlier methods concentrate only on minimum privacy area requirement for a CR, 4,30 without considering any information related to users and therefore are highly vulnerable to attacks based on such information. A promising approach is the PROB framework, 31 which translates the locations into features and allows users to assign sensitivity levels for each feature.…”
Section: Related Workmentioning
confidence: 99%
“…Another popular solution is the Spatial Obfuscation which replaces user's real location with a larger CR 4,7,10,22,28‐32 . Earlier methods concentrate only on minimum privacy area requirement for a CR, 4,30 without considering any information related to users and therefore are highly vulnerable to attacks based on such information.…”
Section: Related Workmentioning
confidence: 99%
“…Different from public blockchain, everyone needs to be certificated to join the consensus process in private blockchain. Transactions on private blockchains are fast and efficient, but a single private blockchain network cannot effectively protect user privacy in location services [ 20 ].…”
Section: Introductionmentioning
confidence: 99%