• Corpus ID: 9586258

Computationally Recoverable Camouflage: A Universal Model for Privacy-Aware Location-Based Services

@article{Ma2016ComputationallyRC,
  title={Computationally Recoverable Camouflage: A Universal Model for Privacy-Aware Location-Based Services},
  author={Changsha Ma and Zhisheng Yan and Chang Wen Chen},
  journal={ArXiv},
  year={2016},
  volume={abs/1603.07711}
}
With the prevalence of location-based services (LBSs) supported by advanced positioning technology, there is a dramatic increase in the transmission of high-precision personal geographical data. Malicious use of these sensitive data will threaten the privacy of LBS users. Although privacy research in LBSs has received wide attention, related works are mostly focused on some specific applications. Due to high diversity of LBSs, it is critical to build a universal model that is able to handle… 

Figures from this paper

References

SHOWING 1-10 OF 28 REFERENCES

Geo-indistinguishability: differential privacy for location-based systems

The growing popularity of location-based systems, allowing unknown/untrusted servers to easily collect huge amounts of information regarding users' location, has recently started raising serious

Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism

This paper proposes a novel technique to guarantee the privacy of users of LBS that does not need any trusted third party to anonymise the users and only makes use of a public-key infrastructure.

An Obfuscation-Based Approach for Protecting Location Privacy

An adversary model is introduced and an analysis of the proposed obfuscation operators is provided to evaluate their robustness against adversaries aiming to reverse the obfuscation effects to retrieve a location that better approximates the location of the users.

Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

A scalable architecture for protecting the location privacy from various privacy threats resulting from uncontrolled usage of LBSs is described, including the development of a personalized location anonymization model and a suite of location perturbation algorithms.

Enabling Private Continuous Queries for Revealed User Locations

Experimental results show that the robust spatial cloaking algorithm is scalable and efficient while providing anonymity for large numbers of continuous queries without hiding users' locations.

Cover locations: availing location-based services without revealing the location

The results show that the proposed solution, which requires minor computations without the need for any out-of-band information such as traffic densities in a region or the road network information, is superior to other client-based solutions.

A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for K-NN Search

A private circular query protocol (PCQP) to deal with the privacy and the accuracy issues of privacy-preserving LBS and simulation results show that the k-NN query accuracy rate of the proposed protocol is higher than 90% even when is large.

Search me if you can: Privacy-preserving location query service

A suite of novel fine-grained Privacy-preserving Location Query Protocol (PLQP) that allows different levels of location query on encrypted location information for different users, and it is efficient enough to be applied in mobile platforms.

Location anonymity in continuous location-based services

The results show that the techniques investigated can indeed protect user anonymity at a desired level, and at the same time, minimize the size of each cloaking area, allowing users to receive high quality services.

Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers

  • Rinku Dewri
  • Computer Science
    IEEE Transactions on Mobile Computing
  • 2013
It is empirically demonstrate that the use of cloaking regions can adversely impact the preservation of privacy in the presence of such approximate location knowledge, and how perturbation-based mechanisms can instead provide a well-balanced tradeoff between privacy and service accuracy.