Location privacy-preserving mechanisms in location-based services: A comprehensive survey
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
The long road to computational location privacy: A survey
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …
the usage of mobile applications, among which many use location to provide geolocated …
Optimal geo-indistinguishable mechanisms for location privacy
NE Bordenabe, K Chatzikokolakis… - Proceedings of the 2014 …, 2014 - dl.acm.org
We consider the geo-indistinguishability approach to location privacy, and the trade-off with
respect to utility. We show that, given a desired degree ofgeo-indistinguishability, it is …
respect to utility. We show that, given a desired degree ofgeo-indistinguishability, it is …
Privacy in trajectory micro-data publishing: a survey
We survey the literature on the privacy of trajectory micro-data, ie, spatiotemporal
information about the mobility of individuals, whose collection is becoming increasingly …
information about the mobility of individuals, whose collection is becoming increasingly …
Privacy games: Optimal user-centric data obfuscation
R Shokri - arXiv preprint arXiv:1402.3426, 2014 - arxiv.org
In this paper, we design user-centric obfuscation mechanisms that impose the minimum
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …
Utility-aware synthesis of differentially private and attack-resilient location traces
As mobile devices and location-based services become increasingly ubiquitous, the privacy
of mobile users' location traces continues to be a major concern. Traditional privacy …
of mobile users' location traces continues to be a major concern. Traditional privacy …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
Privacy games along location traces: A game-theoretic framework for optimizing location privacy
R Shokri, G Theodorakopoulos… - ACM Transactions on …, 2016 - dl.acm.org
The mainstream approach to protecting the privacy of mobile users in location-based
services (LBSs) is to alter (eg, perturb, hide, and so on) the users' actual locations in order to …
services (LBSs) is to alter (eg, perturb, hide, and so on) the users' actual locations in order to …
Quantifying interdependent privacy risks with location data
Co-location information about users is increasingly available online. For instance, mobile
users more and more frequently report their co-locations with other users in the messages …
users more and more frequently report their co-locations with other users in the messages …
Constructing elastic distinguishability metrics for location privacy
K Chatzikokolakis, C Palamidessi… - arXiv preprint arXiv …, 2015 - arxiv.org
With the increasing popularity of hand-held devices, location-based applications and
services have access to accurate and real-time location information, raising serious privacy …
services have access to accurate and real-time location information, raising serious privacy …