The ubiquity of mobile devices with global positioning functionality (e.g., GPS and Assisted GPS) and Internet connectivity (e.g., 3G andWi-Fi) has resulted in widespread development of location-based services (LBS). Typical examples of LBS include local business search, e-marketing, social networking, and automotive traffic monitoring. Although LBS provide valuable services for mobile users, reveal- ing their private locations to potentially untrusted LBS service providers pose priva- cy concerns. In general, there are two types of LBS, namely, snapshot and continu- ous LBS. For snapshot LBS, a mobile user only needs to report its current location to a service provider once to get its desired information. On the other hand, a mo- bile user has to report its location to a service provider in a periodic or on-demand manner to obtain its desired continuous LBS. Protecting user location privacy for continuous LBS is more challenging than snapshot LBS because adversaries may use the spatial and temporal correlations in the user’s a sequence of location sam- ples to infer the user’s location information
CITATION STYLE
Chow, C.-Y., & Mokbel, M. F. (2011). Privacy of Spatial Trajectories. In Computing with Spatial Trajectories (pp. 109–141). Springer New York. https://doi.org/10.1007/978-1-4614-1629-6_4
Mendeley helps you to discover research relevant for your work.