메뉴 건너뛰기




Volumn 5599, Issue , 2009, Pages 59-83

Private information retrieval techniques for enabling location privacy in location-based services

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMIZER; COMMUNICATION OVERHEADS; HAND-HELD DEVICES; K-NEAREST-NEIGHBOR QUERIES; LOCATION INFORMATION; LOCATION PRIVACY; LOCATION-AWARE; LOCATION-BASED SERVICES; PRIVACY VIOLATION; PRIVATE INFORMATION RETRIEVAL; SMARTPHONES; USER LOCATION; USER PRIVACY;

EID: 70349130407     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03511-1_3     Document Type: Conference Paper
Times cited : (37)

References (36)
  • 2
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • San Francisco, CA
    • Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Mobi Sys 2003, San Francisco, CA (2003)
    • (2003) Mobi Sys 2003
    • Gruteser, M.1    Grunwald, D.2
  • 3
    • 2342562393 scopus 로고    scopus 로고
    • Protecting privacy in continuous location-tracking applications
    • Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Security & Privacy 2(2), 28-34 (2004)
    • (2004) IEEE Security & Privacy , vol.2 , Issue.2 , pp. 28-34
    • Gruteser, M.1    Liu, X.2
  • 4
    • 34547720006 scopus 로고    scopus 로고
    • The new casper: Query processing for location services without compromising privacy
    • Seoul, Korea
    • Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy. In: VLDB 2006, Seoul, Korea, pp. 763-774 (2006)
    • (2006) VLDB 2006 , pp. 763-774
    • Mokbel, M.F.1    Chow, C.Y.2    Aref, W.G.3
  • 5
    • 33646153058 scopus 로고    scopus 로고
    • Protecting privacy against location-based personal identification
    • Jonker, W., Petković, M. (eds.). SDM 2005. Springer, Heidelberg
    • Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol.3674, pp. 185-199. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3674 , pp. 185-199
    • Bettini, C.1    Wang, X.S.2    Jajodia, S.3
  • 6
    • 27944454864 scopus 로고    scopus 로고
    • A customizable k-anonymity model for protecting location privacy
    • Columbus, OH
    • Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: ICDCS 2005, Columbus, OH, pp. 620-629 (2005)
    • (2005) ICDCS 2005 , pp. 620-629
    • Gedik, B.1    Liu, L.2
  • 7
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46-55 (2003)
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 8
    • 37849018331 scopus 로고    scopus 로고
    • Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
    • Papadias, D., Zhang, D., Kollios, G. (eds.). SSTD 2007. Springer, Heidelberg
    • Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol.4605, pp. 239-257. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4605 , pp. 239-257
    • Khoshgozaran, A.1    Shahabi, C.2
  • 9
    • 57149129292 scopus 로고    scopus 로고
    • Private queries in location based services: Anonymizers are not necessary
    • Vancouver, BC, Canada
    • Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD 2008, Vancouver, BC, Canada, pp. 121-132 (2008)
    • (2008) SIGMOD 2008 , pp. 121-132
    • Ghinita, G.1    Kalnis, P.2    Khoshgozaran, A.3    Shahabi, C.4    Tan, K.L.5
  • 11
    • 48649106117 scopus 로고    scopus 로고
    • Hiding location information from location-based services
    • Mannheim, Germany
    • Hengartner, U.: Hiding location Information from location-based services. In: MDM 2007, Mannheim, Germany, pp. 268-272 (2007)
    • (2007) MDM 2007 , pp. 268-272
    • Hengartner, U.1
  • 12
    • 52649118020 scopus 로고    scopus 로고
    • Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
    • Cancún, México
    • Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: ICDE 2008, Cancún, México, pp. 366-375 (2008)
    • (2008) ICDE 2008 , pp. 366-375
    • Yiu, M.L.1    Jensen, C.S.2    Huang, X.3    Lu, H.4
  • 14
    • 33745565439 scopus 로고    scopus 로고
    • Polylogarithmic private approximations and efficient matching
    • Halevi, S., Rabin, T. (eds.). TCC 2006. Springer, Heidelberg
    • Indyk, P., Woodruff, D.P.: Polylogarithmic private approximations and efficient matching. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.3876, pp. 245-264. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3876 , pp. 245-264
    • Indyk, P.1    Woodruff, D.P.2
  • 15
    • 38149079700 scopus 로고    scopus 로고
    • Louis, lester and pierre: Three protocols for location privacy
    • Borisov, N., Golle, P. (eds.). PET 2007. Springer, Heidelberg
    • Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.4776, pp. 62-76. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4776 , pp. 62-76
    • Zhong, G.1    Goldberg, I.2    Hengartner, U.3
  • 18
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private Information retrieval
    • Kushilevitz, E., Ostrovsky, R.: Replication is not needed: Single database, computationally-private Information retrieval. In: FOCS, pp. 364-373 (1997)
    • (1997) FOCS , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 19
    • 85141026002 scopus 로고    scopus 로고
    • On the computational practicality of private Information retrieval
    • Stony Brook Network Security and Applied Cryptography Lab. Tech. Report
    • Sion, R.: On the computational practicality of private Information retrieval. In: Proceedings of the Network and Distributed Systems Security Symposium, 2007. Stony Brook Network Security and Applied Cryptography Lab. Tech. Report (2007)
    • (2007) Proceedings of the Network and Distributed Systems Security Symposium, 2007
    • Sion, R.1
  • 20
    • 70349126126 scopus 로고    scopus 로고
    • Querying databases privately
    • Springer, Heidelberg
    • Asonov, D.: Querying Databases Privately. LNCS, vol.3128. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3128
    • Asonov, D.1
  • 21
    • 39049088061 scopus 로고    scopus 로고
    • Almost optimal private Information retrieval
    • Dingle-dine, R., Syverson, P.F. (eds.). PET 2002. Springer, Heidelberg
    • Asonov, D., Freytag, J.C.: Almost optimal private Information retrieval. In: Dingle-dine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.2482, pp. 209-223. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2482 , pp. 209-223
    • Asonov, D.1    Freytag, J.C.2
  • 22
    • 33750252128 scopus 로고    scopus 로고
    • Private information storage with logarithm-space secure hardware
    • Toulouse, France
    • Iliev, A., Smith, S.W.: Private Information storage with logarithm-space secure hardware. In: International Information Security Workshops, Toulouse, France, pp. 199-214 (2004)
    • (2004) International Information Security Workshops , pp. 199-214
    • Iliev, A.1    Smith, S.W.2
  • 23
    • 0038684362 scopus 로고    scopus 로고
    • Practical private information retrieval with secure copro-cessors
    • August
    • Smith, S.W., Safford, D.: Practical private Information retrieval with secure copro-cessors. Technical report, IBM (August 2000)
    • (2000) Technical Report IBM
    • Smith, S.W.1    Safford, D.2
  • 24
    • 84937574654 scopus 로고    scopus 로고
    • A random server model for private Information retrieval or how to achieve Information theoretic pir avoiding database replication
    • Rolim, J.D.P., Serna, M., Luby, M. (eds.). RANDOM 1998. Springer, Heidelberg
    • Gertner, Y., Goldwasser, S., Malkin, T.: A random server model for private Information retrieval or how to achieve Information theoretic pir avoiding database replication. In: Rolim, J.D.P., Serna, M., Luby, M. (eds.) RANDOM 1998. LNCS, vol.1518, pp. 200-217. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1518 , pp. 200-217
    • Gertner, Y.1    Goldwasser, S.2    Malkin, T.3
  • 25
    • 4344573261 scopus 로고    scopus 로고
    • Reducing the information retrieval: Pir with preprocessing
    • Beimel, A., Ishai, Y., Malkin, T.: Reducing the Information retrieval: Pir with preprocessing. J. Cryptology 17(2), 125-151 (2004)
    • (2004) J. Cryptology , vol.17 , Issue.2 , pp. 125-151
    • Beimel, A.1    Ishai, Y.2    Malkin, T.3
  • 26
    • 0034205020 scopus 로고    scopus 로고
    • Protecting data privacy in private information retrieval schemes
    • Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private Information retrieval schemes. J. Comput. Syst. Sci. 60(3), 592-629 (2000)
    • (2000) J. Comput. Syst. Sci. , vol.60 , Issue.3 , pp. 592-629
    • Gertner, Y.1    Ishai, Y.2    Kushilevitz, E.3    Malkin, T.4
  • 28
    • 2342505463 scopus 로고    scopus 로고
    • Securing web servers against insider attack
    • Washington, DC, USA
    • Jiang, S., Smith, S., Minami, K.: Securing web servers against insider attack. In: ACSAC 2001, Washington, DC, USA, pp. 265-276 (2001)
    • (2001) ACSAC 2001 , pp. 265-276
    • Jiang, S.1    Smith, S.2    Minami, K.3
  • 30
    • 28044449142 scopus 로고    scopus 로고
    • Sea-cnn: Scalable processing of continuous k-nearest neighbor queries in spatio-temporal databases
    • Tokyo, Japan
    • Xiong, X., Mokbel, M.F., Aref, W.G.: Sea-cnn: Scalable processing of continuous k-nearest neighbor queries in spatio-temporal databases. In: ICDE 2005, Tokyo, Japan, pp. 643-654 (2005)
    • (2005) ICDE 2005 , pp. 643-654
    • Xiong, X.1    Mokbel, M.F.2    Aref, W.G.3
  • 31
    • 23944481004 scopus 로고    scopus 로고
    • Monitoring k-nearest neighbor queries over moving objects
    • Tokyo, Japan
    • Yu, X., Pu, K.Q., Koudas, N.: Monitoring k-nearest neighbor queries over moving objects. In: ICDE 2005, Tokyo, Japan, pp. 631-642 (2005)
    • (2005) ICDE 2005 , pp. 631-642
    • Yu, X.1    Pu, K.Q.2    Koudas, N.3
  • 32
    • 33846316938 scopus 로고
    • Uber die stetige abbildung einer linie auf ein flachenstuck
    • Hilbert, D.: Uber die stetige abbildung einer linie auf ein flachenstuck. Math. Ann. 38, 459-460 (1891)
    • (1891) Math. Ann. , vol.38 , pp. 459-460
    • Hilbert, D.1
  • 36
    • 0030714231 scopus 로고    scopus 로고
    • Private information storage (extended abstract)
    • New York, NY, USA
    • Ostrovsky, R., Shoup, V.: Private Information storage (extended abstract). In: STOC 1997, New York, NY, USA, pp. 294-303 (1997)
    • (1997) STOC 1997 , pp. 294-303
    • Ostrovsky, R.1    Shoup, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.