Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/14913
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMerrill, Shawn-
dc.contributor.authorBasalp, Nilgun-
dc.contributor.authorBiskup, Joachim-
dc.contributor.authorBuchmann, Erik-
dc.contributor.authorClifton, Chris-
dc.contributor.authorKUIJPERS, Bart-
dc.contributor.authorOTHMAN, Walied-
dc.contributor.authorSavas, Erkay-
dc.date.accessioned2013-04-03T12:01:12Z-
dc.date.available2013-04-03T12:01:12Z-
dc.date.issued2013-
dc.identifier.citationProceedings of PriSMO: Privacy and Security for Moving Objects, p. 1-6-
dc.identifier.isbnIn progress-
dc.identifier.urihttp://hdl.handle.net/1942/14913-
dc.description.abstractLocation-Based Services (LBS) are becoming more prevalent. While there are many benefits, there are also real privacy risks. People are unwilling to give up the benefits - but can we reduce privacy risks without giving up on LBS entirely? This paper explores the possibility of introducing uncertainty into location information when using an LBS, so as to reduce privacy risk while maintaining good quality of service. This paper also explores the current uses of uncertainty information in a selection of mobile applications.-
dc.language.isoen-
dc.publisherIEEE Computer Society-
dc.rightsIEEE Computer Society-
dc.subject.otherMobility; Databases; Data mining; Privacy-
dc.titlePrivacy through Uncertainty in Location-Based Services-
dc.typeProceedings Paper-
local.bibliographicCitation.conferencedateJune 3, 2013-
local.bibliographicCitation.conferencenamePriSMO: Privacy and Security for Moving Objects a workshop in conjunction with the 14th IEEE International Conference on Mobile Data Management (MDM 2013)-
local.bibliographicCitation.conferenceplaceMilano, Italy-
dc.identifier.epage6-
dc.identifier.spage1-
local.bibliographicCitation.jcatC1-
dc.relation.references[1] “Apple Q&A on location data,” Press Release, Apr. 27 2011. [Online]. Available: http://www.apple.com/pr/library/2011/04/ 27Apple- Q- A- on- Location- Data.html [2] J. Brownlee, “This creepy app isn’t just stalking women without their knowledge, it’s a wake-up call about facebook privacy [update],” Cult of Mac, Mar. 30 2012. [Online]. Available: http://www.cultofmac.com/157641/this-creepy-app-isnt-just-stalking- women-without-their-knowledge-its-a-wake-up-call-about-facebook- privacy/ [3] E. Yigitoglu, M. L. Damiani, O. Abul, and C. Silvestri, “Privacy- preserving sharing of sensitive semantic locations under road- network constraints,” in 13th International Conference on Mobile Data Management, 2012, pp. 186–195. [Online]. Available: http: //doi.ieeecomputersociety.org/10.1109/MDM.2012.48 [4] R. Kato, M. Iwata, T. Hara, A. Suzuki, X. Xie, Y. Arase, and S. Nishio, “A dummy-based anonymization method based on user trajectory with pauses,” in SIGSPATIAL ’12 Proceedings of the 20th International Conference on Advances in Geographic Information Systems, 2012, pp. 249–258. [Online]. Available: http: //doi.acm.org/10.1145/2424321.2424354 [5] “Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data,” Official Journal of the European Communities, vol. No I., no. 281, pp. 31–50, Oct. 24 1995. [Online]. Available: http://ec.europa.eu/justice home/fsj/privacy/law/index en.htm [6] M. Woo, “CatchMeIfUCan - fake location,” Android app, Jul. 12 2011. [Online]. Available: https://play.google.com/store/apps/details? id=kr.woot0pia.gps [7] Lexa, “Fake GPS location,” Android app, Sep. 20 2012. [Online]. Avail- able: https://play.google.com/store/apps/details?id=com.lexa.fakegps [8] C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimercati, and P. Samarati, “Location privacy protection through obfuscation-based techniques,” in Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, Jul. 8-11 2007, pp. 47–60. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-73538-0 4 [9] H. Kido, Y. Yanagisawa, and T. Satoh, “Protection of Location Privacy using Dummies for Location-based Services,” in 21st International Conference on Data Engineering Workshops (ICDEW’05), Tokyo, Japan, Apr. 05-08 2005, p. 1248. [Online]. Available: http://doi.ieeecomputersociety.org/10.1109/ICDE.2005.269 [10] A. Suzuki, M. Iwata, Y. Arase, T. Hara, X. Xie, and S. Nishio, “A user location anonymization method for location based services in a real environment,” in GIS ’10 Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2010, pp. 398–401. [Online]. Available: http: //doi.acm.org/10.1145/1869790.1869846 [11] J. I. Hong and J. A. Landay, “An Architecture for Privacy- Sensitive Ubiquitous Computing,” in Proceedings of the Second International Conference on Mobile Systems, Applications, and Services (MobiSys 2004), Jun. 06-09 2004. [Online]. Available: https://dl.acm.org/citation.cfm?id=990087 [12] M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of First ACM/USENIX International Conference on Mobile Systems, Applica- tions, and Services (MobiSys), May 2003. [13] M.E.Nergiz,M.Atzori,Y.Saygin,andB.Gu ̈c ̧,“Towardstrajectory anonymization: a generalization-based approach,” Transactions on Data Privacy, vol. 2, no. 1, pp. 47–75, 2009. [Online]. Available: http://www.tdp.cat/issues/abs.a020a09.php [14] A. R. Beresford and F. Stajano, “Mix Zones: User Privacy in Location- aware Services,” in 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), Orlando, Florida, Mar. 14-17 2004, pp. 127–131. [Online]. Available: http: //doi.ieeecomputersociety.org/10.1109/PERCOMW.2004.1276918 [15] “On foursquare, cheating, and claiming mayorships from your couch...” blog, Apr. 7 2010. [Online]. Available: http://blog.foursquare.com/ 2010/04/07/503822143/ [16] “The followup to our ’mayorships from your couch’ post,” blog, Apr. 8 2010. [Online]. Available: http://blog.foursquare.com/2010/04/ 08/505862083/ [17] J. B, “GPS vs Wifi: The battle for location accuracy using yelp check-ins,” blog, Aug. 14 2012. [Online]. Available: http://engineeringblog.yelp.com/2012/08/ gps- vs- wifi- the- battle- for- location- accuracy- using- yelp- check- ins. html-
local.type.refereedRefereed-
local.type.specifiedProceedings Paper-
local.relation.fp7245410-
local.bibliographicCitation.btitleProceedings of PriSMO: Privacy and Security for Moving Objects-
item.fullcitationMerrill, Shawn; Basalp, Nilgun; Biskup, Joachim; Buchmann, Erik; Clifton, Chris; KUIJPERS, Bart; OTHMAN, Walied & Savas, Erkay (2013) Privacy through Uncertainty in Location-Based Services. In: Proceedings of PriSMO: Privacy and Security for Moving Objects, p. 1-6.-
item.contributorMerrill, Shawn-
item.contributorBasalp, Nilgun-
item.contributorBiskup, Joachim-
item.contributorBuchmann, Erik-
item.contributorClifton, Chris-
item.contributorKUIJPERS, Bart-
item.contributorOTHMAN, Walied-
item.contributorSavas, Erkay-
item.fulltextWith Fulltext-
item.accessRightsOpen Access-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
prismo-2-1.pdfPeer-reviewed author version1.93 MBAdobe PDFView/Open
Show simple item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.