Privacy-preserving data mining: methods, metrics, and applications

R Mendes, JP Vilela - IEEE Access, 2017 - ieeexplore.ieee.org
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Location privacy protection based on differential privacy strategy for big data in industrial internet of things

C Yin, J **, R Sun, J Wang - IEEE Transactions on Industrial …, 2017 - ieeexplore.ieee.org
In the research of location privacy protection, the existing methods are mostly based on the
traditional anonymization, fuzzy and cryptography technology, and little success in the big …

Geo-indistinguishability: Differential privacy for location-based systems

ME Andrés, NE Bordenabe, K Chatzikokolakis… - Proceedings of the …, 2013 - dl.acm.org
The growing popularity of location-based systems, allowing unknown/untrusted servers to
easily collect huge amounts of information regarding users' location, has recently started …

The long road to computational location privacy: A survey

V Primault, A Boutet, SB Mokhtar… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …

Semantic trajectories modeling and analysis

C Parent, S Spaccapietra, C Renso… - ACM Computing …, 2013 - dl.acm.org
Focus on movement data has increased as a consequence of the larger availability of such
data due to current GPS, GSM, RFID, and sensors techniques. In parallel, interest in …

Optimal geo-indistinguishable mechanisms for location privacy

NE Bordenabe, K Chatzikokolakis… - Proceedings of the 2014 …, 2014 - dl.acm.org
We consider the geo-indistinguishability approach to location privacy, and the trade-off with
respect to utility. We show that, given a desired degree ofgeo-indistinguishability, it is …

A classification of location privacy attacks and approaches

M Wernke, P Skvortsov, F Dürr, K Rothermel - Personal and ubiquitous …, 2014 - Springer
In recent years, location-based services have become very popular, mainly driven by the
availability of modern mobile devices with integrated position sensors. Prominent examples …

Supporting anonymous location queries in mobile environments with privacygrid

B Bamba, L Liu, P Pesti, T Wang - … of the 17th international conference on …, 2008 - dl.acm.org
This paper presents PrivacyGrid-a framework for supporting anonymous location-based
queries in mobile information delivery systems. The PrivacyGrid framework offers three …

Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges, and countermeasures

P Asuquo, H Cruickshank, J Morley… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Location-based services (LBSs) have gained popularity as a result of the advances in
mobile and communication technologies. LBS provide users with relevant information based …