Privacy-preserving data mining: methods, metrics, and applications
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …
computing devices. The analysis of such information is fostering businesses and …
Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …
contexts. For instance, with the emergence of distributed applications, several providers are …
Location privacy protection based on differential privacy strategy for big data in industrial internet of things
C Yin, J **, R Sun, J Wang - IEEE Transactions on Industrial …, 2017 - ieeexplore.ieee.org
In the research of location privacy protection, the existing methods are mostly based on the
traditional anonymization, fuzzy and cryptography technology, and little success in the big …
traditional anonymization, fuzzy and cryptography technology, and little success in the big …
Geo-indistinguishability: Differential privacy for location-based systems
The growing popularity of location-based systems, allowing unknown/untrusted servers to
easily collect huge amounts of information regarding users' location, has recently started …
easily collect huge amounts of information regarding users' location, has recently started …
The long road to computational location privacy: A survey
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …
the usage of mobile applications, among which many use location to provide geolocated …
Semantic trajectories modeling and analysis
C Parent, S Spaccapietra, C Renso… - ACM Computing …, 2013 - dl.acm.org
Focus on movement data has increased as a consequence of the larger availability of such
data due to current GPS, GSM, RFID, and sensors techniques. In parallel, interest in …
data due to current GPS, GSM, RFID, and sensors techniques. In parallel, interest in …
Optimal geo-indistinguishable mechanisms for location privacy
We consider the geo-indistinguishability approach to location privacy, and the trade-off with
respect to utility. We show that, given a desired degree ofgeo-indistinguishability, it is …
respect to utility. We show that, given a desired degree ofgeo-indistinguishability, it is …
A classification of location privacy attacks and approaches
In recent years, location-based services have become very popular, mainly driven by the
availability of modern mobile devices with integrated position sensors. Prominent examples …
availability of modern mobile devices with integrated position sensors. Prominent examples …
Supporting anonymous location queries in mobile environments with privacygrid
This paper presents PrivacyGrid-a framework for supporting anonymous location-based
queries in mobile information delivery systems. The PrivacyGrid framework offers three …
queries in mobile information delivery systems. The PrivacyGrid framework offers three …
Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges, and countermeasures
Location-based services (LBSs) have gained popularity as a result of the advances in
mobile and communication technologies. LBS provide users with relevant information based …
mobile and communication technologies. LBS provide users with relevant information based …