메뉴 건너뛰기




Volumn , Issue , 2013, Pages

A framework for context-aware privacy of sensor data on mobile systems

Author keywords

Android; behavioral privacy; context awareness; inferences; ipShield; model based privacy

Indexed keywords

ANDROID; CONTEXT-AWARENESS; INFERENCE FUNCTIONS; INFERENCES; INFORMATION DISCLOSURE; IPSHIELD; PERSONALIZED SERVICE; PRIVACY MECHANISMS;

EID: 84875481327     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2444776.2444791     Document Type: Conference Paper
Times cited : (51)

References (27)
  • 1
    • 84875543877 scopus 로고    scopus 로고
    • http
    • http://http://developer.android.com/guide/basics/what-is-android.html.
  • 2
    • 84875517838 scopus 로고    scopus 로고
    • github.com/gsbabil/PDroid-AOSP-JellyBean
    • github.com/gsbabil/PDroid-AOSP-JellyBean.
  • 3
    • 84875523894 scopus 로고    scopus 로고
    • http://funf.org.
  • 4
    • 84869415696 scopus 로고    scopus 로고
    • Poster: Model-based context privacy for personal data streams
    • S. Chakraborty, K. R. Raghavan, and M. Srivastava. Poster: Model-based context privacy for personal data streams. CCS, 2012.
    • (2012) CCS
    • Chakraborty, S.1    Raghavan, K.R.2    Srivastava, M.3
  • 5
    • 85092638806 scopus 로고    scopus 로고
    • Mobile apps: It's time to move up to condos
    • D. Chu, A. Kansal, J. Liu, and F. Zhao. Mobile apps: it's time to move up to condos. HotOS, 2011.
    • (2011) HotOS
    • Chu, D.1    Kansal, A.2    Liu, J.3    Zhao, F.4
  • 6
    • 67650655439 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • C. Dwork. Differential privacy: a survey of results. TAMC, 2008.
    • (2008) TAMC
    • Dwork, C.1
  • 7
    • 79955570859 scopus 로고    scopus 로고
    • Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck and et al. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. OSDI, 2010.
    • (2010) OSDI
    • Enck, W.1
  • 8
    • 82955204103 scopus 로고    scopus 로고
    • Implementing gentry's fully-homomorphic encryption scheme
    • C. Gentry and S. Halevi. Implementing gentry's fully-homomorphic encryption scheme. EUROCRYPT, 2011.
    • (2011) EUROCRYPT
    • Gentry, C.1    Halevi, S.2
  • 9
    • 84877950290 scopus 로고    scopus 로고
    • Androidleaks: Automatically detecting potential privacy leaks in android applications on a large scale
    • C. Gibler, J. Crussell, J. Erickson, and H. Chen. Androidleaks: automatically detecting potential privacy leaks in android applications on a large scale. TRUST, 2012.
    • (2012) TRUST
    • Gibler, C.1    Crussell, J.2    Erickson, J.3    Chen, H.4
  • 10
    • 0021941417 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof-systems. STOC, 1985.
    • (1985) STOC
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 11
    • 78650728589 scopus 로고    scopus 로고
    • On the anonymity of home/work location pairs
    • P. Golle and K. Partridge. On the anonymity of home/work location pairs. Pervasive, 2009.
    • (2009) Pervasive
    • Golle, P.1    Partridge, K.2
  • 12
    • 84862643033 scopus 로고    scopus 로고
    • Maskit: Privately releasing user context streams for personalized mobile applications
    • M. Götz, S. Nath, and J. Gehrke. Maskit: privately releasing user context streams for personalized mobile applications. SIGMOD, 2012.
    • (2012) SIGMOD
    • Götz, M.1    Nath, S.2    Gehrke, J.3
  • 13
    • 84875511072 scopus 로고    scopus 로고
    • Privacy via the johnson-lindenstrauss transform
    • abs/1204.2606
    • K. Kenthapadi, A. Korolova, I. Mironov, and N. Mishra. Privacy via the johnson-lindenstrauss transform. CoRR, abs/1204.2606, 2012.
    • (2012) CoRR
    • Kenthapadi, K.1    Korolova, A.2    Mironov, I.3    Mishra, N.4
  • 15
    • 84875515212 scopus 로고    scopus 로고
    • Expectation and purpose: Understanding users' mental models of mobile app privacy through crowdsourcing
    • J. Lin, N. Sadeh, S. Amini, J. Lindqvist, J. I. Hong, and J. Zhang. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. UbiComp, 2012.
    • (2012) UbiComp
    • Lin, J.1    Sadeh, N.2    Amini, S.3    Lindqvist, J.4    Hong, J.I.5    Zhang, J.6
  • 16
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • K. Liu, H. Kargupta, and J. Ryan. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. on Knowl. & Data Eng., 2006.
    • (2006) IEEE Trans. on Knowl. & Data Eng.
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 19
    • 77953213147 scopus 로고    scopus 로고
    • Myths and fallacies of "personally identifiable information"
    • A. Narayanan and V. Shmatikov. Myths and fallacies of "personally identifiable information". Commun. ACM, 2010.
    • (2010) Commun. ACM
    • Narayanan, A.1    Shmatikov, V.2
  • 20
    • 77956270463 scopus 로고    scopus 로고
    • Predicting user activities in the sequence of mobile context for ambient intelligence environment using dynamic bayesian network
    • H.-S. Park and S.-B. Cho. Predicting user activities in the sequence of mobile context for ambient intelligence environment using dynamic bayesian network. In ICAART, 2010.
    • (2010) ICAART
    • Park, H.-S.1    Cho, S.-B.2
  • 21
    • 84870561687 scopus 로고    scopus 로고
    • Override: A mobile privacy framework for context-driven perturbation and synthesis of sensor data streams
    • K. R. Raghavan, S. Chakraborty, and M. Srivastava. Override: A mobile privacy framework for context-driven perturbation and synthesis of sensor data streams. PhoneSense, 2012.
    • (2012) PhoneSense
    • Raghavan, K.R.1    Chakraborty, S.2    Srivastava, M.3
  • 22
    • 77955690373 scopus 로고    scopus 로고
    • A theory of utility and privacy of data sources
    • L. Sankar, S. Rajagopalan, and V. Poor. A theory of utility and privacy of data sources. ISIT, 2010.
    • (2010) ISIT
    • Sankar, L.1    Rajagopalan, S.2    Poor, V.3
  • 23
    • 84869476246 scopus 로고    scopus 로고
    • Deanonymizing mobility traces: Using social network as a side-channel
    • M. Srivatsa and M. Hicks. Deanonymizing mobility traces: Using social network as a side-channel. CCS, 2012.
    • (2012) CCS
    • Srivatsa, M.1    Hicks, M.2
  • 25
    • 85072741693 scopus 로고    scopus 로고
    • Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
    • T. Vila, R. Greenstadt, and D. Molnar. Why we can't be bothered to read privacy policies models of privacy economics as a lemons market. ICEC, 2003.
    • (2003) ICEC
    • Vila, T.1    Greenstadt, R.2    Molnar, D.3
  • 26
    • 84864343215 scopus 로고    scopus 로고
    • Fast app launching for mobile devices using predictive user context
    • T. Yan, D. Chu, D. Ganesan, A. Kansal, and J. Liu. Fast app launching for mobile devices using predictive user context. MobiSys, 2012.
    • (2012) MobiSys
    • Yan, T.1    Chu, D.2    Ganesan, D.3    Kansal, A.4    Liu, J.5
  • 27
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C.-C. Yao. How to generate and exchange secrets. SFCS, 1986.
    • (1986) SFCS
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.