Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1066116.1189037acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
Article

Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking

Published: 05 May 2003 Publication History
First page of PDF

References

[1]
{1} Nissanka B. Priyantha, Anit Chakraborty, and Hari Balakrishnan. The cricket location-support system. In Proceedings of the sixth annual international conference on Mobile computing and networking, pages 32-43. ACM Press, 2000.
[2]
{2} I. Getting. The global positioning system. IEEE Spectrum , 30(12): 36-47, December 1993.
[3]
{3} Mike Spreitzer and Marvin Theimer. Providing location information in a ubiquitous computing environment (panel session). In Proceedings of the fourteenth ACM symposium on Operating systems principles, pages 270- 283. ACM Press, 1993.
[4]
{4} Andy Harter, Andy Hopper, Pete Steggles, Andy Ward, and Paul Webster. The anatomy of a context-aware application. In Mobile Computing and Networking, pages 59-68, 1999.
[5]
{5} Rui Jose and Nigel Davies. Scalable and flexible location-based services for ubiquitous information access. In Proceedings of First International Symposium on Hand-held and Ubiquitous Computing, HUC'99, pages 52-66. Springer Verlag, 1999.
[6]
{6} C. Bisdikian, J. Christensen, J. Davis II, M. Ebling, G. Hunt, W. Jerome, H. Lei, and S. Maes. Enabling location-based applications. In 1st Workshop on Mobile commerce, 2001.
[7]
{7} P. A. Karger and Y. Frankel. Security and privacy threats to ITS. In Proceedings of the Second World Congress on Intelligent Transport Systems, volume 5, Yokohama, Japan, Nov 1995.
[8]
{8} Roy Want, Andy Hopper, Veronica Falco, and Jonathan Gibbons. The active badge location system. ACM Transactions on Information Systems (TOIS), 10(1): 91-102, 1992.
[9]
{9} Philip E. Agre. Transport informatics and the new landscape of privacy issues. Computer Professionals for Social Responsibility (CPSR) Newsletter, 13(3), 1995.
[10]
{10} Marc Langheinrich. Privacy by design - principles of privacy-aware ubiquitous systems. In G.D. Abowd, B. Brumitt, and S. Shafer, editors, Ubicomp 2001 Proceedings , volume 2201 of Lecture Notes in Computer Science , pages 273-291. Springer, 2001.
[11]
{11} Andreas Pfitzmann and Marit Koehntopp. Anonymity, unobservability, and pseudonymity --a proposal for terminology. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies -- Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS. Springer, 2000.
[12]
{12} Michael K. Reiter and Aviel D. Rubin. Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security, 1(1): 66-92, 1998.
[13]
{13} D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM (USA), 42(2): 39-41, 1999.
[14]
{14} NextBus Information Systems. Nextbus website. 1321 67th Street, Emeryville, CA 94608, USA, http://www.nextbus.com, Oct 2002.
[15]
{15} J. Cuellar, J. Morris, and D. Mulligan. Internet engineering task force geopriv requirements. http://www.ietf.org/html.charters/geopriv-charter.html, Oct 2002.
[16]
{16} Sastry Duri, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, and Jung-Mu Tang. Framework for security and privacy in automotive telematics. In Proceedings of the second international workshop on Mobile commerce, pages 25-32. ACM Press, 2002.
[17]
{17} Jalal Al-Muhtadi, Roy Campbell, Apu Kapadia, M. Dennis Mickunas, and Seung Yi. Routing through the mist: Privacy preserving communication in ubiquitous computing environments. In Proceedigns of IEEE International Conference of Distributed Computing Systems (ICDCS), pages 65-74, Vienna, Austria, Jul 2002.
[18]
{18} Asim Smailagic and David Kogan. Location sensing and privacy in a context-aware computing environment. IEEE Wireless Communications, 9(5): 10-17, Oct 2002.
[19]
{19} David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2): 84-90, 1981.
[20]
{20} A. Pfitzmann, B. Pfitzmann, and M. Waidner. Isdnmixes: Untraceable communication with very small bandwidth overhead. In Wolfgang Effelsberg, Hans Werner Meuer, and Günter Müller, editors, Proceedings of Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI/ITG-Fachtagung, volume 267 of Informatik-Fachberichte , Mannheim, Germany, Feb 1991. Springer.
[21]
{21} David Goldschlag, Michael Reed, and Paul Syverson. Onion routing. Communications of the ACM, 42(2): 39- 41, 1999.
[22]
{22} Anonymizer. Anonymizer website. 5694 Mission Center Road #426, San Diego, CA 92108-4380, http://www.anonymizer.com, 2000.
[23]
{23} Clay Shields and Brian Neil Levine. A protocol for anonymous communication over the internet. In Proceedings of the 7th ACM conference on Computer and communications security, pages 33-42. ACM Press, 2000.
[24]
{24} Yong Guan, Xinwen Fu, Riccardo Bettati, and Wei Zhao. A quantitative analysis of anonymous communications. IEEE Transactions on Reliability, (to appear).
[25]
{25} Nabil R. Adam and John C. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys (CSUR), 21(4): 515-556, 1989.
[26]
{26} Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. In Proceedings of the ACM SIGMOD Conference on Management of Data, pages 439- 450. ACM Press, May 2000.
[27]
{27} Dakshi Agrawal and Charu C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the twentieth ACM SIGMODSIGACT-SIGART symposium on Principles of database systems, pages 247-255. ACM Press, May 2001.
[28]
{28} P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.
[29]
{29} J. Reed, K. Krizman, B. Woerner, and T. Rappaport. An overview of the challenges and progress in meeting the e-911 requirement for location service. IEEE Personal Communications Magazine, 5(3): 30-37, April 1998.
[30]
{30} Tele Atlas North America, Inc. Geocode web-site. 1605 Adams Drive, Menlo Park, CA 94025, http://www.geocode.com/, Oct 2002.
[31]
{31} J. A. Simpson and E. S. C. Weiner, editors. Oxford English Dictionary, Second Edition. Clarendon Press, 1989.
[32]
{32} Hanan Samet. The Design and Analysis of Spatial Data Structures. Addison-Wesley, Reading, MA, 1990.
[33]
{33} U.S. Geological Survey (USGS). Spatial data transfer standard. 12201 Sunrise Valley Drive, Reston, VA 20192, USA, http://mcmcweb.er.usgs.gov/sdts/, 1995.
[34]
{34} U.S. Geological Survey (USGS). Digital line graph data. 12201 Sunrise Valley Drive, Reston, VA 20192, USA, http://edc.usgs.gov/geodata/, Oct 2002.
[35]
{35} DCROG. Denver regional council of governments: Denver regional travel behavior inventory, 2001. 2480 W. 26th Avenue, Suite 200B, Denver, CO 80211-5580.
[36]
{36} Colorado Department of Transportation. Traffic statistics & data. Public Relations Office, 4201 E Arkansas Ave, Denver, CO 80222, http://www.dot.state.co.us/, Oct 2002.

Cited By

View all
  • (2024)Effective Route Recommendation Leveraging Differentially Private Location DataMathematics10.3390/math1219297712:19(2977)Online publication date: 25-Sep-2024
  • (2024)Pervasive User Data Collection from Cyberspace: Privacy Concerns and CountermeasuresCryptography10.3390/cryptography80100058:1(5)Online publication date: 31-Jan-2024
  • (2024)A strategy to balance location privacy and positioning accuracyPLOS ONE10.1371/journal.pone.030444619:5(e0304446)Online publication date: 30-May-2024
  • Show More Cited By
  1. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiSys '03: Proceedings of the 1st international conference on Mobile systems, applications and services
    May 2003
    180 pages
    ISBN:9781450377973
    DOI:10.1145/1066116
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 May 2003

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Conference

    MobiSys03
    Sponsor:

    Acceptance Rates

    MobiSys '03 Paper Acceptance Rate 23 of 153 submissions, 15%;
    Overall Acceptance Rate 274 of 1,679 submissions, 16%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)135
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 04 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Effective Route Recommendation Leveraging Differentially Private Location DataMathematics10.3390/math1219297712:19(2977)Online publication date: 25-Sep-2024
    • (2024)Pervasive User Data Collection from Cyberspace: Privacy Concerns and CountermeasuresCryptography10.3390/cryptography80100058:1(5)Online publication date: 31-Jan-2024
    • (2024)A strategy to balance location privacy and positioning accuracyPLOS ONE10.1371/journal.pone.030444619:5(e0304446)Online publication date: 30-May-2024
    • (2024)Where you go is who you are: a study on machine learning based semantic privacy attacksJournal of Big Data10.1186/s40537-024-00888-811:1Online publication date: 12-Mar-2024
    • (2024)Inter-regional Lens on the Privacy Preferences of Drivers for ITS and Future VANETsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641997(1-20)Online publication date: 11-May-2024
    • (2024)A lightweight location privacy protection scheme based on RFIDThird International Conference on Electronic Information Engineering, Big Data, and Computer Technology (EIBDCT 2024)10.1117/12.3031184(185)Online publication date: 19-Jul-2024
    • (2024)Mobility AI Agents and NetworksIEEE Transactions on Intelligent Vehicles10.1109/TIV.2024.34542859:7(5124-5129)Online publication date: Jul-2024
    • (2024)OLBS: Oblivious Location-Based ServicesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334787419(2231-2243)Online publication date: 2024
    • (2024)A Framework for Tradeoff Between Location Privacy Preservation and Quality of Experience in Location Based ServicesIEEE Open Journal of Vehicular Technology10.1109/OJVT.2024.33641845(428-439)Online publication date: 2024
    • (2024)PaDS: An adaptive and privacy-enabling Data Pipeline for Smart Cars2024 25th IEEE International Conference on Mobile Data Management (MDM)10.1109/MDM61037.2024.00026(41-50)Online publication date: 24-Jun-2024
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media