Table of Contents
International Journal of Vehicular Technology
Volume 2011 (2011), Article ID 486975, 12 pages
http://dx.doi.org/10.1155/2011/486975
Research Article

Time in Privacy Preserving LBSs: An Overlooked Dimension

1Dipartimento di Informatica, Sapienza Università di Roma 00185, Roma, Italy
2Dipartimento di Matematica, Università di Roma Tre, Roma, Italy
3Dipartimento di Ingegneria e Scienza dell'Informazione, Università di Trento 38122, Trento, Italy
4Department of Computer Science, Vrije Universiteit Amsterdam, 1081 Amsterdam HV, The Netherlands

Received 16 October 2010; Revised 23 January 2011; Accepted 27 January 2011

Academic Editor: Cristina Pinotti

Copyright © 2011 Luciana Marconi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Conti, V. T. N. Nguyen, and B. Crispo, “CRePE: context-related policy enforcement for android,” in Proceedings of the 13th Information Security Conference (ISC '10), 2010.
  2. “Electronic toll collection california (USA),” http://www.bayareafastrak.org/.
  3. “London congestion charge,” http://www.tfl.gov.uk/roadusers/congestioncharging/.
  4. T. Xu and Y. Cai, “Exploring historical location data for anonimity preservation in location-based services,” in Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08), pp. 547–555, Phoenix, Ariz, USA, April 2008.
  5. T. Xu and Y. Cai, “Feeling-based location privacy protection for location-based services,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 348–357, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Krumm, “A survey of computational location privacy,” Personal and Ubiquitous Computing, vol. 13, no. 6, pp. 391–399, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. K. LeFevre, D. J. DeWitt, and R. Ramakrishnan, “Incognito: efficient full-domain K-anonymity,” in ACM SIGMOD International Conference on Management of Data (SIGMOD '05), pp. 49–60, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  8. A. Solanas and R. Di Pietro, “A linear-time multivariate micro-aggregation for privacy protection in uniform very large data sets,” in Proceedings of the 5th International Conference on Modeling Decisions for Artificial Intelligence (MDAI '08), vol. 5285 of Lecture Notes in Computer Science, pp. 203–214, 2008. View at Publisher · View at Google Scholar
  9. L. Sweeney, “k-anonymity: a model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems, vol. 10, no. 5, pp. 557–570, 2002. View at Publisher · View at Google Scholar · View at Scopus
  10. M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (MobiSys ’03), pp. 31–42, 2003.
  11. B. Gedik and L. Liu, “A customizable k-anonymity model for protecting location privacy,” in Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS ’05), pp. 620–629, 2005.
  12. T. Xu and Y. Cai, “Location anonymity in continuous location-based services,” in Proceedings of the 15th Annual ACM International Symposium on Advances in Geographic Information Systems (GIS '07), pp. 1–8, 2007.
  13. M. F. Mokbel, C. Chow, and W. G. Aref, “The new casper: query processing for location services without compromising privacy,” in Proceedings of the 32nd International Conference on Very Large Data (VLDB ’06), pp. 763–774, 2006.
  14. C. Y. Chow, M. F. Mokbel, and X. Liu, “A peer-to-peer spatial cloaking algorithm for anonymous location-based service,” in Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems (GIS '06), pp. 171–178, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  15. C.-Y. Chow and M. F. Mokbel, “Enabling private continuous queries for revealed user locations,” in Proceedings of the 10th International Symposium on Advances in Spatial and Temporal Databases (SSTD '07), vol. 4605 of Lecture Notes in Computer Science, pp. 258–275, 2007.
  16. A. R. Beresford and F. Stajano, “Location privacy in pervasive computing,” IEEE Pervasive Computing, vol. 2, no. 1, pp. 46–55, 2003. View at Publisher · View at Google Scholar · View at Scopus
  17. B. Hoh and M. Gruteser, “Protecting location privacy through path confusion,” in Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm '05), pp. 194–205, September 2005. View at Publisher · View at Google Scholar · View at Scopus
  18. J. Freudiger, M. H. Manshaei, J. P. Hubaux, and D. C. Parkes, “On non-cooperative location privacy: a game-theoretic analysis,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 324–337, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. J. Freudiger, M. H. Manshaei, J. Le Boudec, and J. Hubaux, “On the age of pseudonyms in mobile ad hoc networks,” in Proceedings of the 29th Conference on Information Communications (INFOCOM '10), pp. 1577–1585, San Diego, Calif, USA, March 2010.
  20. B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, “Preserving privacy in GPS traces via uncertainty-aware path cloaking,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 161–171, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  21. J. Freudiger, M. Raya, M. Felegyhazi, P. Papadimitratos, and J. Hubaux, “Mix-zones for location privacy in vehicular networks,” in Proceedings of the 1st International Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS '07), 2007.
  22. H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services,” in Proceedings of the 2nd International Conference on Pervasive Services (ICPS '05), pp. 88–97, July 2005. View at Publisher · View at Google Scholar · View at Scopus
  23. C. Bettini, X. S. Wang, and S. Jajodia, “Protecting privacy against location-based personal identification,” in Proceedings of the 2nd VLDB Workshop on Secure Data Management, pp. 185–199, 2005.
  24. K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, “Caravan: providing location privacy for vanet,” in Proceedings of Embedded Security in Cars (ESCAR '05), 2005.
  25. P. Cencioni and R. Di Pietro, “A mechanism to enforce privacy in vehicle-to-infrastructure communication,” Computer Communications, vol. 31, no. 12, pp. 2790–2802, 2008. View at Publisher · View at Google Scholar · View at Scopus
  26. M. Gruteser and X. Liu, “Protecting privacy in continuous location-tracking applications,” IEEE Security and Privacy, vol. 2, no. 2, pp. 28–34, 2004. View at Publisher · View at Google Scholar · View at Scopus
  27. M. L. Damiani, E. Bertino, and C. Silvestri, “The PROBE framework for the personalized cloaking of private locations,” Transactions on Data Privacy, vol. 3, no. 2, pp. 123–148, 2010. View at Google Scholar
  28. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. L. Tan, “Private queries in location based services: anonymizers are not necessary,” in ACM SIGMOD International Conference on Management of Data (SIGMOD '08), pp. 121–132, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  29. A. Serjantov and G. Danezis, “Towards an information theoretic metric for anonymity,” in Proceedings of the International Symposium on Privacy Enhancing Technologies (PETS ’02), pp. 41–53, 2002.
  30. R. Di Pietro and A. Viejo, “Location privacy and resilience in wireless sensor networks querying,” Computer Communications, vol. 34, no. 3, pp. 515–523, 2011. View at Publisher · View at Google Scholar · View at Scopus
  31. R. Di Pietro, P. Michiardi, and R. Molva, “Confidentiality and integrity for data aggregation in WSN using peer monitoring,” Security and Communication Networks, vol. 2, no. 2, pp. 181–194, 2009. View at Publisher · View at Google Scholar · View at Scopus
  32. S. Ortolani, M. Conti, B. Crispo, and R. Di Pietro, “Event handoff unobservability in WSN,” in Proceedings of the IFIP Open Research Problems in Network Security Conference (iNetSec '10), 2010.
  33. O. Abul, F. Bonchi, and M. Nanni, “Never walk alone: uncertainty for anonymity in moving objects databases,” in Proceedings of the 24th IEEE International Conference on Data Engineering, pp. 376–385, IEEE Computer Society, Washington, DC, USA, 2008.
  34. L. Marconi, R. Di Pietro, B. Crispo, and M. Conti, “Time warp: how time affects privacy in LBSs,” in Proceedings of the 12th International Conference on Information and Communications Security (ICICS '10), pp. 325–339, 2010.
  35. R. Shokri, J. Freudiger, and J. Hubaux, “Unified framework for location privacy,” in Proceedings of the 9th International Symposium on Privacy Enhancing Technologies (PETS ’10), pp. 203–214, 2010.
  36. M. Piorkowski, N. Sarafijanovic-Djukic, and M. Grossglauser, “CRAWDAD data set epfl/mobility (v. 2009-02-24),” February 2009, http://crawdad.cs.dartmouth.edu/epfl/mobility.
  37. “San francisco exploratorium—cabspotting project,” http://cabspotting.org/.