A major concern for large-scale deployment of location-based services (LBSs) is the potential abuse of their client location data, which may imply sensitive personal information. Location privacy protection is challenging because a location itself may reveal a subject's identity. To support location anonymity, existing research reduces location resolution… (More)
Exploring historical location data for anonymity preservation in location-based services" (2007). Retrospective Theses and Dissertations. Paper 14878. ABSTRACT We present a new approach for K-anonymity protection in Location-Based Services (LBSs).
Anonymous location information may be correlated with restricted spaces such as home and office for subject re-identification. This makes it a great challenge to provide location privacy protection for users of location-based services. Existing work adopts traditional <i>K</i>-anonymity model and ensures that each location disclosed in service requests is a… (More)
—Unlike conventional range queries, a range-monitoring query is a continuous query. It requires retrieving mobile objects inside a user-defined region and providing continuous updates as the objects move into and out of the region. In this paper, we present an efficient technique for real-time processing of such queries. In our approach, each mobile object… (More)
Today's Internet is incapable of handling information like a stop sign. Such information stays in a geographic region, consistently beams to the people who move into from certain direction. This paper presents a system aimed at bridging the Internet with the physical world. The hardware platform of the system consists of a central server and a set of… (More)
—While location information is crucial to design efficient and scalable ad hoc networks, the exposure of such information presents them significant safety threats. This paper investigates the problem of preventing an adversary from locating (and thus destroying) nodes based on their location information revealed explicitly in communications. Our idea is to… (More)
Multimedia streaming applications can significantly boost the value of mobile ad hoc networks (MANET). Live streaming, however , means continuous data delivery, which is a major challenge in MANET. Because of host mobility, a streaming path may be broken easily, causing streaming interruption. In this paper, we address this problem with a light-weighted yet… (More)
Xu, Ge, "Location cloaking for location privacy protection and location safety protection" (2010). Graduate Theses and Dissertations. 2010 ii DEDICATION To my parents and my wife-Without whose love and support I would not have been able to complete this work iii