Privacy of Spatial Trajectories

  • Chow C
  • Mokbel M
N/ACitations
Citations of this article
51Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The ubiquity of mobile devices with global positioning functionality (e.g., GPS and Assisted GPS) and Internet connectivity (e.g., 3G andWi-Fi) has resulted in widespread development of location-based services (LBS). Typical examples of LBS include local business search, e-marketing, social networking, and automotive traffic monitoring. Although LBS provide valuable services for mobile users, reveal- ing their private locations to potentially untrusted LBS service providers pose priva- cy concerns. In general, there are two types of LBS, namely, snapshot and continu- ous LBS. For snapshot LBS, a mobile user only needs to report its current location to a service provider once to get its desired information. On the other hand, a mo- bile user has to report its location to a service provider in a periodic or on-demand manner to obtain its desired continuous LBS. Protecting user location privacy for continuous LBS is more challenging than snapshot LBS because adversaries may use the spatial and temporal correlations in the user’s a sequence of location sam- ples to infer the user’s location information

Cite

CITATION STYLE

APA

Chow, C.-Y., & Mokbel, M. F. (2011). Privacy of Spatial Trajectories. In Computing with Spatial Trajectories (pp. 109–141). Springer New York. https://doi.org/10.1007/978-1-4614-1629-6_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free