2008 IEEE 24th International Conference on Data Engineering 2008
DOI: 10.1109/icde.2008.4497445
|View full text |Cite
|
Sign up to set email alerts
|

SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
212
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 268 publications
(212 citation statements)
references
References 13 publications
0
212
0
Order By: Relevance
“…The most common are techniques that resort to private-public dichotomy to justify scenarios where privacy is preserved or threatened [16]. Value based tradeoffs is another privacy justifying framework that does not see privacy as a moral right, but as preference over other values [17]. Thus, the rationale for a mobile usage scenario posing a privacy threat is based on its supports or conflicts with other functionality of the system such as performance or usability.…”
Section: A Contextual Integritymentioning
confidence: 99%
“…The most common are techniques that resort to private-public dichotomy to justify scenarios where privacy is preserved or threatened [16]. Value based tradeoffs is another privacy justifying framework that does not see privacy as a moral right, but as preference over other values [17]. Thus, the rationale for a mobile usage scenario posing a privacy threat is based on its supports or conflicts with other functionality of the system such as performance or usability.…”
Section: A Contextual Integritymentioning
confidence: 99%
“…So a typical group nearest neighbour query for a group of peers would be "Which is the restaurant that is closest to all of us" or "Find a meeting spot that is within 2 miles of all of us?" Some of the general work in this direction (non-privacypreserving) includes [6], [7] among others. One of the widely referenced works in this area is SpaceTwist [6] which is a protocol where a querying client asks the LBS server to return a set of k points closest to its own location or knearest neighbours.…”
Section: A Location-based Servicesmentioning
confidence: 99%
“…Various obfuscation-based techniques to control the release of location information have been recently proposed (see, e.g., [36,6,7]), based on generalization or perturbation of the precise user's position. One of the first attempts to support privacy in generic context aware systems through obfuscation mechanisms is semantic eWallet [37], an architecture to support context-awareness by means of techniques to retrieve users' context data while enforcing their privacy preferences.…”
Section: Obfuscation Of Context Datamentioning
confidence: 99%
“…Hence, while they may be profitably applied to simple LBS such as nearest neighbor services, it is unlikely that they would be practical for complex context-aware services. On the other hand, obfuscation techniques proposed for LBS (e.g., [6,7]) are specifically addressed to location information; hence, those techniques cannot be straightforwardly applied to other contextual domains. With respect to techniques based on identity anonymity in LBS (e.g., [8,9]) we point out that, since many other kinds of context data besides location may help an adversary in identifying the owner of those data, the amount of context data to be generalized in order to enforce anonymity is large.…”
Section: Introductionmentioning
confidence: 99%