Learn More
Many novel location-based services (LBS) such as a friend finder service require knowledge about the positions of mobile users. Usually, location services are used to manage these positions, and for providing basic functionality like spatial range queries or spatial events to the LBS. Managing and using the positions of mobile users raises privacy issues,(More)
In recent years, location-based services have become very popular, mainly driven by the availability of modern mobile devices with integrated position sensors. Prominent examples are points of interest finders or geo-social networks such as Facebook Places, Qype, and Loopt. However, providing such services with private user positions may raise serious(More)
The fast advances of mobile devices and positioning technologies has led to the flourish of Location-Based Services (LBS), in that people want to enjoy wireless services everywhere like in hotels, colleges, etc. LBS, the branch of computer program level services used in various fields and support, the application are broadly classified as Maps and(More)
Today, location-based applications and services such as friend finders and geo-social networks are very popular. However, storing private position information on third-party location servers leads to privacy problems. In our previous work, we proposed a position sharing approach for secure management of positions on non-trusted servers [1, 2], which(More)
—With the increasing adoption of private cloud in-frastructures by providers and enterprises, the monitoring of these infrastructures is becoming crucial. The rationale behind monitoring is manifold: reasons include saving energy, lowering costs, and better maintenance. In the e-Science sector, moreover, the collection of infrastructure and(More)
The success of location-based services is growing together with the diffusion of GPS-equipped smart devices. As a consequence, privacy concerns are raising year by year. Location privacy is becoming a major interest in research and industry world, and many solutions have been proposed for it. One of the simplest and most flexible approaches is obfuscation,(More)
  • 1