Location privacy-preserving mechanisms in location-based services: A comprehensive survey

H Jiang, J Li, P Zhao, F Zeng, Z Xiao… - ACM Computing Surveys …, 2021 - dl.acm.org
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …

Privacy-preserving data mining: methods, metrics, and applications

R Mendes, JP Vilela - IEEE Access, 2017 - ieeexplore.ieee.org
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …

Geo-indistinguishability: Differential privacy for location-based systems

ME Andrés, NE Bordenabe, K Chatzikokolakis… - Proceedings of the …, 2013 - dl.acm.org
The growing popularity of location-based systems, allowing unknown/untrusted servers to
easily collect huge amounts of information regarding users' location, has recently started …

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Semantic trajectories modeling and analysis

C Parent, S Spaccapietra, C Renso… - ACM Computing …, 2013 - dl.acm.org
Focus on movement data has increased as a consequence of the larger availability of such
data due to current GPS, GSM, RFID, and sensors techniques. In parallel, interest in …

Optimal geo-indistinguishable mechanisms for location privacy

NE Bordenabe, K Chatzikokolakis… - Proceedings of the 2014 …, 2014 - dl.acm.org
We consider the geo-indistinguishability approach to location privacy, and the trade-off with
respect to utility. We show that, given a desired degree ofgeo-indistinguishability, it is …

Protecting Trajectory From Semantic Attack Considering -Anonymity, -Diversity, and -Closeness

Z Tu, K Zhao, F Xu, Y Li, L Su… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Nowadays, human trajectories are widely collected and utilized for scientific research and
business purpose. However, publishing trajectory data without proper handling might cause …

A novel time-obfuscated algorithm for trajectory privacy protection

RH Hwang, YL Hsueh… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Location-based services (LBS) which bring so much convenience to our daily life have been
intensively studied over the years. Generally, an LBS query processing can be categorized …

Ensuring confidentiality of geocoded health data: Assessing geographic masking strategies for individual‐level data

PA Zandbergen - Advances in medicine, 2014 - Wiley Online Library
Public health datasets increasingly use geographic identifiers such as an individual's
address. Geocoding these addresses often provides new insights since it becomes possible …

Empirical models of privacy in location sharing

E Toch, J Cranshaw, PH Drielsma, JY Tsai… - Proceedings of the 12th …, 2010 - dl.acm.org
The rapid adoption of location tracking and mobile social networking technologies raises
significant privacy challenges. Today our understanding of people's location sharing privacy …