Privacy for real-time location-based services

Location-Based Services (LBSs) are developing at an amazing pace. Whereas the first generation of LBSs required manual user input of location information via simple web-based interfaces, current GPS-enabled devices such as smartphones or in-car navigation systems can automatically initiate and negotiate LBSs based on their current position. The latest generation of LBSs combines high position accuracy with real-time position updates, which enables numerous applications including asset tracking, location-based advertising, location-sensitive billing, and street-level routing and positioning.

[1]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[2]  John Krumm,et al.  Inference Attacks on Location Tracks , 2007, Pervasive.

[3]  Telecommunications Board,et al.  IT Roadmap to a Geospatial Future , 2003 .

[4]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[5]  Eija Kaasinen,et al.  User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.

[6]  Marco Gruteser,et al.  Wireless Location Privacy Protection , 2003, Computer.

[7]  Tanzima Hashem,et al.  Safeguarding Location Privacy in Wireless Ad-Hoc Networks , 2007, UbiComp.

[8]  Agusti Solanas,et al.  Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism , 2007, EuroPKI.

[9]  Hua Lu,et al.  SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[10]  Lars Kulik,et al.  Simulation of Obfuscation and Negotiation for Location Privacy , 2005, COSIT.

[11]  Lars Kulik,et al.  Location privacy and location-aware computing , 2006 .

[12]  Marco Gruteser,et al.  USENIX Association , 1992 .

[13]  Chi-Yin Chow,et al.  A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.

[14]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[15]  Stephanie Forrest,et al.  Anonymous Data Collection in Sensor Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[16]  John Krumm,et al.  A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.

[17]  Yu Zhang,et al.  Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.

[18]  Lars Kulik,et al.  Distributed Histograms for Processing Aggregate Data from Moving Objects , 2007, 2007 International Conference on Mobile Data Management.

[19]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[20]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[21]  Marco Gruteser,et al.  A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks , 2003, SPC.

[22]  F. Esponda Everything that is not important: Negative databases [Research Frontier] , 2008, IEEE Computational Intelligence Magazine.

[23]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[24]  George Danezis,et al.  A study on the value of location privacy , 2006, WPES '06.

[25]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.