A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Location Oblivious Privacy Protection for Group Nearest Neighbor Queries
[chapter]
2014
Lecture Notes in Computer Science
Up to now, users have had to rely on an external party, typically a location service provider (LSP), for computing an optimal meeting point. ...
Our experimental results show that we provide a readily deployable solution for real life applications which can also be deployed for other geo-spatial queries and applications. ...
Introduction Internet accessibility through smartphones has fueled the increased popularity of Location Based Services (LBS). Finding a convenient meeting point for a group is a common problem. ...
doi:10.1007/978-3-319-11593-1_20
fatcat:bo6eebyf5nabdp5rzajddczpsu
Location Privacy Preserving of Mobile Users using Secured Homomorphism
2015
International Journal of Computer Applications
This paper, proposes algorithms for location privacy preserving of mobile users. ...
These applications often rely on current locations of individual users or a group of users to provide the desired service. ...
Location privacy preservation in mobile surroundings is difficult for two reasons. ...
doi:10.5120/20533-2877
fatcat:6r2nc7nkzbgbxnlhakootmq2ta
Mobile Applications for Privacy-Preserving Digital Contact Tracing
2022
Zenodo
Presentation slides of the advanced seminar "Mobile Applications for Privacy-Preserving Digital Contact Tracing" presented at the 23rd IEEE Intl. Conference on Mobile Data Management (MDM 2022). ...
We provide an overview of this emerging field, while focusing on Bluetooth-based privacy-preserving solutions. ...
Limited privacy 20 Mobile Applications for Privacy-Preserving Digital Contact Tracing @ 23 rd IEEE MDM 2022, Online, June 8, 2022
Mobile Applications for Privacy-Preserving Digital Contact Tracing ...
doi:10.5281/zenodo.6622627
fatcat:fkcwwnz4ebg6jhjpkpae77n7su
Reclaiming privacy for smartphone applications
2011
2011 IEEE International Conference on Pervasive Computing and Communications (PerCom)
As a result, the growing amount of sensitive information shared by smartphone users raises serious privacy concerns and motivates the need for appropriate privacy-preserving mechanisms. ...
In this paper, we present a novel architecture geared for privacy-sensitive applications where personal information is shared among users and decisions are made based on given optimization criteria. ...
We would like to thank the Program Committee and the Reviewers of the 9th IEEE International Conference on Pervasive Computing and Communications (PerCom'11) as well as Valtteri Niemi for the very precious ...
doi:10.1109/percom.2011.5767598
dblp:conf/percom/CristofaroDA11
fatcat:mvabrjvkx5hmpfzrb2x2z2v7gi
Location-assured, multifactor authentication on smartphones via LTE communication
2013
Mobile Multimedia/Image Processing, Security, and Applications 2013
location determined on and reported by the client's Smartphone. ...
With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using ...
This additional LTE-LS privacy feature can be used in combination with other privacy preserving authentication techniques, such as [11] , to meet the privacy protecting aspects required in any remote ...
doi:10.1117/12.2018027
fatcat:55haczoz7bc5dc64xg62npjvfi
A Practical PIR-based Scheme for Discovering Nearby Places for Smartphone Applications
2019
Advances in Science, Technology and Engineering Systems
We present a privacy-preserving approach for discovering nearby places of interest to Alice. ...
Our implementation results demonstrate that our approach has faster decode and retrieve time for the nearby POIs on smartphones compared with current similar work. ...
Our privacy-preserving protocol for LBS helps Alice to search for specific nearby POIs on her smartphone by sending a query to the location based service provider (LBSP) over a wireless network. ...
doi:10.25046/aj040104
fatcat:q4e6xqyvz5duhdaezi6pnhxhbi
Incentive Mechanisms for Mobile Crowd Sensing: Current States and Challenges of Work
[article]
2014
arXiv
pre-print
Based on the architecture, we discuss various research challenges about incentive mechanism designs for MCS applications, followed by potential future work discussions. ...
To better meet the demands of MCS applications at a societal scale, incentive mechanisms are indispensable. ...
Our bidding-model based privacy-preserving verifiable incentive mechanism for MCS applications. ...
arXiv:1310.8364v2
fatcat:idpwttacungprh2eqnhc3i2nry
Protecting privacy for group nearest neighbor queries with crowdsourced data and computing
2013
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing - UbiComp '13
User privacy in location-based services (LBSs) has become an important research area. ...
We focus on the group nearest neighbor (GNN) query that allows a group to meet at their nearest point of interest such as a restaurant that minimizes the total or maximum distance of the group. ...
Threat Model Evaluating k GNNs from a data set depends on the locations of all group members. For privacy preserving kGNN queries, users do not reveal their locations to others. ...
doi:10.1145/2493432.2494524
dblp:conf/huc/HashemAKTQ13
fatcat:pasna6d6qvatrhmyq7iku4mjji
Proposing a Secure Cloud Database Storage [SCDS] Model
2017
International Journal of Advanced Research in Computer Science and Software Engineering
Being service based, there's no storage hardware to buy, manage and maintain, and depending on the service, it can greatly reduce, if not eliminate, data center and storage administrator costs. ...
Here in this paper we have proposed a Secure Cloud Database Storage [SCDS] Model for improving the customer's satisfaction in third party cloud servers for database storage. ...
Xiaofen Wang discussed One-round secure fair meeting location determination based on homomorphic encryption. ...
doi:10.23956/ijarcsse/v7i3/0144
fatcat:fyetg5igpfc6zpqcti6k3obpw4
Achieving Efficient Query Privacy for Location Based Services
[chapter]
2010
Lecture Notes in Computer Science
Mobile smartphone users frequently need to search for nearby points of interest from a location based service, but in a way that preserves the privacy of the users' locations. ...
We also measured the performance of our query technique on a smartphone and wireless network. ...
Acknowledgments We would like to thank the anonymous reviewers for their helpful comments for improving this paper. We also gratefully acknowledge NSERC and MITACS for funding this research. ...
doi:10.1007/978-3-642-14527-8_6
fatcat:swyk6v2fyrbx7kmcz6lhx4elfe
P2DCA: A Privacy-Preserving based Data Collection and Analysis Framework for IoMT Applications
2019
IEEE Journal on Selected Areas in Communications
In this paper, we propose an efficient privacy-preserving-based data collection and analysis framework for IoMT applications. ...
Therefore, there is a need to preserve the privacy of MSNs during mobile data collection. ...
In this paper, we propose an efficient privacy-preserving-based data collection and analysis framework for IoMT applications. ...
doi:10.1109/jsac.2019.2904349
fatcat:4h5uryourvcfbcomrfuqyo7zgu
Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets
2011
Proceedings of the first ACM conference on Data and application security and privacy - CODASPY '11
Furthermore, we present details on the implementation of a privacy-preserving iPhone application built on top of this library. ...
In particular, we present the design of a library for privacy-preserving reconciliation protocols and provide details on an efficient C++ implementation of this design. ...
Our proof-of concept iPhone application is a first step to investigate whether or not privacy-preserving applications are already viable on smartphones. ...
doi:10.1145/1943513.1943529
dblp:conf/codaspy/MayerTWM11
fatcat:cxdik5gg2jfi7ofqs4j5ofawqa
Privacy-Preserving Positioning in Wi-Fi Fine Timing Measurement
2022
Proceedings on Privacy Enhancing Technologies
We address these shortcomings and present a privacy-preserving passive positioning system that leverages existing Wi-Fi FTM infrastructure and requires no hardware changes. ...
In this paper, we perform the first privacy analysis of Wi-Fi FTM and evaluate devices from a wide variety of vendors. We find the protocol inherently leaks location-sensitive information. ...
Acknowledgments We would like to thank our shepherd Travis Mayberry and reviewers for their valuable feedback. This work was partially supported by NSF grant 1850264. ...
doi:10.2478/popets-2022-0048
fatcat:7lu3fotup5ftzcwh3f5omrtm4a
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
2014
IEEE Transactions on Information Forensics and Security
Similar planning tools for determining optimal meeting locations, based on the location preferences of the users, are highly desirable for event planning and management in popular mobile phone applications ...
In this paper, we address the problem of privacy-preserving optimal meetinglocation computation, especially focusing on its applicability to current mobile devices and applications. ...
Nevertheless, as time scheduling and location determination are two fundamentally different problems, no such work seems to exist for the privacy-preserving meeting location problem. ...
doi:10.1109/tifs.2014.2318435
fatcat:el5vs7iz6jcrdaekez3dljfpba
Privacy-Preserving Indoor Localization on Smartphones
2015
IEEE Transactions on Knowledge and Data Engineering
On the other hand, predominant Smartphone OS localization subsystems currently rely on server-side localization processes, allowing the service provider to know the location of a user at all times. ...
In this paper, we propose an innovative algorithm for protecting users from location tracking by the localization service, without hindering the provisioning of fine-grained location updates on a continuous ...
, Data Mining, and Privacy" and (DATASIM) "DATA science for SIMulating the era of electric vehicles", and an industrial award by MTN Cyprus. ...
doi:10.1109/tkde.2015.2441724
fatcat:zrfqj7hfwzajddorunhbmnhy5y
« Previous
Showing results 1 — 15 out of 3,601 results