Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity

@inproceedings{Tan2009SpatialCR,
  title={Spatial Cloaking Revisited: Distinguishing Information Leakage from Anonymity},
  author={Kar Way Tan and Yimin Lin and Kyriakos Mouratidis},
  booktitle={SSTD},
  year={2009}
}
Location-based services (LBS) are receiving increasing popularity as they provide convenience to mobile users with on-demand information. The use of these services, however, poses privacy issues as the user locations and queries are exposed to untrusted LBSs. Spatial cloaking techniques provide privacy in the form of k-anonymity; i.e., they guarantee that the (location of the) querying user u is indistinguishable from at least k-1 others, where k is a parameter specified by u at query time. To… CONTINUE READING
Highly Cited
This paper has 23 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 15 extracted citations

A privacy protection system for equipment inspection based on mobile terminals

2015 4th International Conference on Computer Science and Network Technology (ICCSNT) • 2015

LPCQP: Lightweight private circular query protocol for privacy-preserving k-NN search

2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) • 2015

ProTACD: A Generic Privacy Process for Vehicle Development

2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications • 2013
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 23 references

Similar Papers

Loading similar papers…