This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
|
class:gradmc2012f:privacy_reading_list [2013/11/28 12:27] dileep [Location Privacy by Cloaking] |
class:gradmc2012f:privacy_reading_list [2025/10/13 12:45] (current) |
||
|---|---|---|---|
| Line 17: | Line 17: | ||
| * Summary: This article proposes a novel behavioral detection framework for mobile worms, viruses, and Trojans based on classifiers that demonstrate more than 96% accuracy. The techniques employed have low overhead for computation time and resources, and are therefore very suitable for use with mobile computers. | * Summary: This article proposes a novel behavioral detection framework for mobile worms, viruses, and Trojans based on classifiers that demonstrate more than 96% accuracy. The techniques employed have low overhead for computation time and resources, and are therefore very suitable for use with mobile computers. | ||
| - | * <html><mark>Preserving Privacy in Mobile Environments With Virtual Network Stacks</mark></html> {{:class:gradmc2012f:preserving_privacy_in_mobile_environments_with_virtual_network_stacks.pdf|PDF}} | + | * <html><mark>Preserving Privacy in Mobile Environments With Virtual Network Stacks</mark></html> {{:class:gradmc2012f:preserving_privacy_in_mobile_environments_with_virtual_network_stacks.pdf|PDF}} MUDASAR |
| * by Alfredo Matos, João Girão, Susana Sargento and Rui Aguiar | * by Alfredo Matos, João Girão, Susana Sargento and Rui Aguiar | ||
| * Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE | * Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE | ||
| Line 69: | Line 69: | ||
| - | * <html><mark>Towards measuring anonymity</mark></html> {{:class:gradmc2012f:towards_measuring_anonymity.pdf|PDF}} | + | * <html><mark>Towards measuring anonymity</mark></html> {{:class:gradmc2012f:towards_measuring_anonymity.pdf|PDF}} |
| * by Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel | * by Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel | ||
| * in Proceedings of PET 2002, April 14-15, 2002, San Francisco, In Hannes Federath (Ed.), Designing Privacy Enhancing Technologies, Lecture Notes in Computer Science, 2002. | * in Proceedings of PET 2002, April 14-15, 2002, San Francisco, In Hannes Federath (Ed.), Designing Privacy Enhancing Technologies, Lecture Notes in Computer Science, 2002. | ||
| Line 117: | Line 117: | ||
| * Summary: This paper describes a scalable architecture for protecting the location privacy from various privacy threats resulting from uncontrolled usage of location-based services (LBSs). This architecture includes the development of a personalized location k-anonymity model and a suite of location perturbation algorithms. The experiments achieve high resilience to location privacy threats without introducing any significant performance penalty. | * Summary: This paper describes a scalable architecture for protecting the location privacy from various privacy threats resulting from uncontrolled usage of location-based services (LBSs). This architecture includes the development of a personalized location k-anonymity model and a suite of location perturbation algorithms. The experiments achieve high resilience to location privacy threats without introducing any significant performance penalty. | ||
| - | * **Protecting Privacy Using k-Anonymity** {{:class:gradmc2012f:protecting_privacy_using_k-anonymity.pdf|PDF}} | + | * **Protecting Privacy Using k-Anonymity** {{:class:gradmc2012f:protecting_privacy_using_k-anonymity.pdf|PDF}} |
| * by KHALED EL EMAM, FIDA KAMAL DANKAR | * by KHALED EL EMAM, FIDA KAMAL DANKAR | ||
| * In Proceedings of JAMIA. 2008, 627-637. | * In Proceedings of JAMIA. 2008, 627-637. | ||
| * Summary: In this paper, the authors focus on k-Anonymity, which is a popular approach for protecting privacy. They considers the two re-identification scenarios that k-Anonymity is intended to protect against. For one of the scenarios, they show that actual re-identification risk under the baseline k-Anonymity is much lower than the threshold risk that the data custodian assumes, and that this results in an excessive amount of information loss, especially at small sampling fractions. They also find that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline k-anonymity. | * Summary: In this paper, the authors focus on k-Anonymity, which is a popular approach for protecting privacy. They considers the two re-identification scenarios that k-Anonymity is intended to protect against. For one of the scenarios, they show that actual re-identification risk under the baseline k-Anonymity is much lower than the threshold risk that the data custodian assumes, and that this results in an excessive amount of information loss, especially at small sampling fractions. They also find that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline k-anonymity. | ||
| - | * **ℓ-Diversity: Privacy Beyond k-Anonymity** {{:class:gradmc2012f:l-diversity-_privacy_beyond_k-anonymity.pdf|PDF}} | + | * **ℓ-Diversity: Privacy Beyond k-Anonymity** {{:class:gradmc2012f:l-diversity-_privacy_beyond_k-anonymity.pdf|PDF}} LAM |
| * by Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer | * by Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer | ||
| * Journal ACM Transactions on Knowledge Discovery from Data (TKDD), Volume 1 Issue 1, March 2007, Article No. 3 | * Journal ACM Transactions on Knowledge Discovery from Data (TKDD), Volume 1 Issue 1, March 2007, Article No. 3 | ||
| Line 188: | Line 188: | ||
| * Summary: This article analyze the problem of location privacy in wireless networks and present a protocol for improving location privacy. The basic approach is to obfuscate several types of privacy-compromising information revealed by a mobile node, including sender identity, time of transmission, and signal strength. | * Summary: This article analyze the problem of location privacy in wireless networks and present a protocol for improving location privacy. The basic approach is to obfuscate several types of privacy-compromising information revealed by a mobile node, including sender identity, time of transmission, and signal strength. | ||
| - | * **Feeling-based Location Privacy Protection for Location-based Services** {{:class:gradmc2012f:feeling_loc_privacy.pdf|PDF}} | + | * **Feeling-based Location Privacy Protection for Location-based Services** {{:class:gradmc2012f:feeling_loc_privacy.pdf|PDF}} MALIK |
| * by Toby Xu, Ying Cai | * by Toby Xu, Ying Cai | ||
| * In Proceeding CCS '09 Proceedings of the 16th ACM conference on Computer and communications security, Pages 348-357 | * In Proceeding CCS '09 Proceedings of the 16th ACM conference on Computer and communications security, Pages 348-357 | ||
| Line 238: | Line 238: | ||
| * Summary: In this paper, the authors study the preservation of query anonymity in Location Based Services. The main idea is to conceal the user coordinates, by replacing them with a spatial region. They propose transformations based on the K-anonymity concept to compute exact answers for range and nearest neighbor search, without revealing the query source. The proposed techniques are applicable to real-life scenarios with numerous mobile users. | * Summary: In this paper, the authors study the preservation of query anonymity in Location Based Services. The main idea is to conceal the user coordinates, by replacing them with a spatial region. They propose transformations based on the K-anonymity concept to compute exact answers for range and nearest neighbor search, without revealing the query source. The proposed techniques are applicable to real-life scenarios with numerous mobile users. | ||
| - | * **Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking** {{:class:gradmc2012f:preserving_privacy_in_gps_traces_via_uncertainty-aware_path_cloaking.pdf|PDF}} | + | * **Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking** {{:class:gradmc2012f:preserving_privacy_in_gps_traces_via_uncertainty-aware_path_cloaking.pdf|PDF}} HOA |
| * by Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady | * by Baik Hoh, Marco Gruteser, Hui Xiong, Ansaf Alrabady | ||
| * In Proceedings of ACM CCS 2007 | * In Proceedings of ACM CCS 2007 | ||
| Line 255: | Line 255: | ||
| * Summary: This paper presents PrivacyGrid - a framework which allows users to express their privacy requirements in terms of location hiding and QoS measures. The authors develope three dynamic grid-based spatial cloaking algorithms for location k-anonymity and location l-diversity in a mobile environment. They also discuss PrivacyGrid mechanisms for supporting anonymous location queries. Experimental evaluation shows that their algorithms provide much higher anonymization success rate and yet are highly efficient in terms of both time complexity and update cost. | * Summary: This paper presents PrivacyGrid - a framework which allows users to express their privacy requirements in terms of location hiding and QoS measures. The authors develope three dynamic grid-based spatial cloaking algorithms for location k-anonymity and location l-diversity in a mobile environment. They also discuss PrivacyGrid mechanisms for supporting anonymous location queries. Experimental evaluation shows that their algorithms provide much higher anonymization success rate and yet are highly efficient in terms of both time complexity and update cost. | ||
| - | * **Hangout: A Privacy Preserving Location Based Social Networking Service.** {{:class:gradmc2012f:hangout-_a_privacy_preserving_location_based_social_networking_service.pdf|PDF}} | + | * **Hangout: A Privacy Preserving Location Based Social Networking Service.** {{:class:gradmc2012f:hangout-_a_privacy_preserving_location_based_social_networking_service.pdf|PDF}} |
| * by Murali Annavaram, Quinn Jacobson, John P. Shen | * by Murali Annavaram, Quinn Jacobson, John P. Shen | ||
| * In Workshop on Mobile Devices and Urban Sensing, (Invited Paper) April 2008 | * In Workshop on Mobile Devices and Urban Sensing, (Invited Paper) April 2008 | ||
| * Summary: This article develops HangOut a privacy preserving social networking application. Hangout protects user’s private information not only from other malicious users but even from system administrators. Hangout uses location and time distortions, symmetric key encryption and several client side controls to aggressively protect privacy with minimal degradation in user’s perceived service value. | * Summary: This article develops HangOut a privacy preserving social networking application. Hangout protects user’s private information not only from other malicious users but even from system administrators. Hangout uses location and time distortions, symmetric key encryption and several client side controls to aggressively protect privacy with minimal degradation in user’s perceived service value. | ||
| - | * **Mix-Zones for Location Privacy in Vehicular Networks** {{:class:gradmc2012f:p.mix-zones_for_location_privacy_in_vehicular_networks.pdf|PDF}} | + | * **Mix-Zones for Location Privacy in Vehicular Networks** {{:class:gradmc2012f:p.mix-zones_for_location_privacy_in_vehicular_networks.pdf|PDF}} BOSUNG |
| * by J. Freudiger, M. Raya, M. Félegyházi, P. Papadimitratos, and J.-P. Hubaux | * by J. Freudiger, M. Raya, M. Félegyházi, P. Papadimitratos, and J.-P. Hubaux | ||
| * In Proceedings of WiN-ITS, August 2007. | * In Proceedings of WiN-ITS, August 2007. | ||
| Line 275: | Line 275: | ||
| * by William J. Buchanan, Zbigniew Kwecka, Elias Ekonomou | * by William J. Buchanan, Zbigniew Kwecka, Elias Ekonomou | ||
| * Journal Mobile Networks and Applications | * Journal Mobile Networks and Applications | ||
| - | * Medusa: a programming framework for crowd-sensing applications [[http://selab.csuohio.edu/~nsridhar/teaching/fall12/eec-492-693-793/papers/Medusa.pdf|PDF]] | + | * Medusa: a programming framework for crowd-sensing applications [[http://selab.csuohio.edu/~nsridhar/teaching/fall12/eec-492-693-793/papers/Medusa.pdf|PDF]] DILEEP |
| * by Ra, Moo R. and Liu, Bin and La Porta, Tom F. and Govindan, Ramesh | * by Ra, Moo R. and Liu, Bin and La Porta, Tom F. and Govindan, Ramesh | ||
| * Mobisys 2012 | * Mobisys 2012 | ||
| Line 295: | Line 295: | ||
| * Concealing the position of individuals in location-based services | * Concealing the position of individuals in location-based services | ||
| * by Aris Gkoulalas-Divanis, Vassilios S. Verykios | * by Aris Gkoulalas-Divanis, Vassilios S. Verykios | ||
| - | * Targeted Advertising on the Handset: Privacy and Security Challenges [[http://www.deutsche-telekom-laboratories.de/~panhui/publications/haddadietalchapter.pdf|PDF]] | + | * Targeted Advertising on the Handset: Privacy and Security Challenges [[http://www.deutsche-telekom-laboratories.de/~panhui/publications/haddadietalchapter.pdf|PDF]] HADI |
| * by Hamed Haddadi, Pan Hui, Tristan Henderson, et al. | * by Hamed Haddadi, Pan Hui, Tristan Henderson, et al. | ||
| * Query-aware location anonymization for road networks [[http://www-users.cs.umn.edu/~mokbel/papers/geoinformatica10b.pdf|PDF]] | * Query-aware location anonymization for road networks [[http://www-users.cs.umn.edu/~mokbel/papers/geoinformatica10b.pdf|PDF]] | ||
| * Dynamic Tessellation of Geographical Regions to Ensure K-anonymity [[http://www.dre.vanderbilt.edu/~jules/anonoly.pdf|PDF]] | * Dynamic Tessellation of Geographical Regions to Ensure K-anonymity [[http://www.dre.vanderbilt.edu/~jules/anonoly.pdf|PDF]] | ||
| * | * | ||