메뉴 건너뛰기




Volumn 8, Issue 6, 2013, Pages 874-887

TrPF: A trajectory privacy-preserving framework for participatory sensing

Author keywords

entropy; information loss; Participatory sensing; trajectory mix zones graph model; trajectory privacy preserving framework

Indexed keywords

ANALYSIS AND SIMULATION; BACK-GROUND KNOWLEDGE; GRAPH MODEL; HISTORY INFORMATIONS; INFORMATION LOSS; PARTICIPATORY SENSING; PARTICIPATORY SENSING APPLICATIONS; PRIVACY PRESERVING;

EID: 84878278820     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2252618     Document Type: Article
Times cited : (150)

References (51)
  • 8
    • 80052696161 scopus 로고    scopus 로고
    • A survey on privacy in mobile participatory sensing applications
    • D. Christin, A. Reinhardt, S. Kanhere, and M. Hollick, "A survey on privacy in mobile participatory sensing applications," J. Syst. Softw., vol. 84, no. 11, pp. 1928-1946, 2011.
    • (2011) J. Syst. Softw. , vol.84 , Issue.11 , pp. 1928-1946
    • Christin, D.1    Reinhardt, A.2    Kanhere, S.3    Hollick, M.4
  • 9
    • 77955274113 scopus 로고    scopus 로고
    • Preserving privacy in participatory sensing systems
    • K. L. Huang, S. S. Kanhere, and W. Hu, "Preserving privacy in participatory sensing systems," Comput. Commun., vol. 33, no. 11, pp. 1266-1280, 2010.
    • (2010) Comput. Commun. , vol.33 , Issue.11 , pp. 1266-1280
    • Huang, K.L.1    Kanhere, S.S.2    Hu, W.3
  • 13
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. R. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Comput., vol. 2, no. 1, pp. 46-55, 2003.
    • (2003) IEEE Pervasive Comput. , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 21
    • 84866628169 scopus 로고    scopus 로고
    • Trajectory privacy in location-based services and data publication
    • C. Y. Chow and M. F. Mokbel, "Trajectory privacy in location-based services and data publication," ACM SIGKDD Explorations Newsletter, vol. 13, no. 1, pp. 19-29, 2011.
    • (2011) ACM SIGKDD Explorations Newsletter , vol.13 , Issue.1 , pp. 19-29
    • Chow, C.Y.1    Mokbel, M.F.2
  • 22
    • 85011022727 scopus 로고    scopus 로고
    • From data privacy to location privacy: Models and algorithms
    • VLDB Endowment
    • L. Liu, "From data privacy to location privacy: Models and algorithms," in Proc. 33rd Int. Conf. Very Large Data Bases (VLDB2007), 2007, pp. 1429-1430, VLDB Endowment.
    • (2007) Proc. 33rd Int. Conf. Very Large Data Bases (VLDB2007) , pp. 1429-1430
    • Liu, L.1
  • 23
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • J. Krumm, "A survey of computational location privacy," Personal and Ubiquitous Comput., vol. 13, no. 6, pp. 391-399, 2009.
    • (2009) Personal and Ubiquitous Comput. , vol.13 , Issue.6 , pp. 391-399
    • Krumm, J.1
  • 26
    • 33745725717 scopus 로고    scopus 로고
    • An anonymous communication technique using dummies for location-based services
    • DOI 10.1109/PERSER.2005.1506394, 1506394, Proceedings - International Conference on Pervasive Services, ICPS '05
    • H. Kido, Y. Yanagisawa, and T. Satoh, "An anonymous communication technique using dummies for location-based services," in Proc. Int. Conf. Pervasive Services, 2005, pp. 88-97. (Pubitemid 43996462)
    • (2005) Proceedings - International Conference on Pervasive Services, ICPS '05 , vol.2005 , pp. 88-97
    • Kido, H.1    Yanagisawa, Y.2    Satoh, T.3
  • 31
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • DOI 10.1109/TMC.2007.1062
    • B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms," IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 1-18, Jan. 2008. (Pubitemid 350183929)
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 33
    • 24944432404 scopus 로고    scopus 로고
    • A formal model of obfuscation and negotiation for location privacy
    • Pervasive Computing: Third International Conference, PERVASIVE 2005, Proceedings
    • M. Duckham and L. Kulik, "A formal model of obfuscation and negotiation for location privacy," in Proc. 3rd Int. Conf. Pervasive Computing (PERVASIVE'05), 2005, pp. 152-170. (Pubitemid 41313330)
    • (2005) Lecture Notes in Computer Science , vol.3468 , pp. 152-170
    • Duckham, M.1    Kulik, L.2
  • 36
    • 69949127837 scopus 로고    scopus 로고
    • On the optimal placement of mix zones
    • New York, NY, USA: Springer
    • J. Freudiger, R. Shokri, and J. P. Hubaux, "On the optimal placement of mix zones," in Privacy Enhancing Technologies. New York, NY, USA: Springer, 2009, pp. 216-234.
    • (2009) Privacy Enhancing Technologies , pp. 216-234
    • Freudiger, J.1    Shokri, R.2    Hubaux, J.P.3
  • 37
    • 84861645005 scopus 로고    scopus 로고
    • Traffic-aware multiple mix zone placement for protecting location privacy
    • X. Liu, H. Zhao, M. Pan, H. Yue, X. Li, and Y. Fang, "Traffic-aware multiple mix zone placement for protecting location privacy," in Proc. IEEE INFOCOM, 2012, pp. 972-980.
    • (2012) Proc. IEEE INFOCOM , pp. 972-980
    • Liu, X.1    Zhao, H.2    Pan, M.3    Yue, H.4    Li, X.5    Fang, Y.6
  • 44
    • 51349083760 scopus 로고    scopus 로고
    • Exploring historical location data for anonymity preservation in location-based services
    • T. Xu and Y. Cai, "Exploring historical location data for anonymity preservation in location-based services," in Proc. IEEE 27th Conf. Computer Communications (INFOCOM2008), 2008, pp. 547-555.
    • (2008) Proc. IEEE 27th Conf. Computer Communications (INFOCOM2008) , pp. 547-555
    • Xu, T.1    Cai, Y.2
  • 47
    • 80051480636 scopus 로고    scopus 로고
    • C-safety: A framework for the anonymization of semantic trajectories
    • A. Monreale, R. Trasarti, D. Pedreschi, C. Renso, and V. Bogorny, "C-safety: A framework for the anonymization of semantic trajectories," Trans. Data Privacy, vol. 4, no. 2, pp. 73-101, 2011.
    • (2011) Trans. Data Privacy , vol.4 , Issue.2 , pp. 73-101
    • Monreale, A.1    Trasarti, R.2    Pedreschi, D.3    Renso, C.4    Bogorny, V.5
  • 51
    • 84891881812 scopus 로고    scopus 로고
    • Privacy: Understanding what, when, and where inference channels in multicamera surveillance video
    • M. Saini, P. K. Atrey, S. Mehrotra, and M. Kankanhalli,"-privacy: Understanding what, when, and where inference channels in multicamera surveillance video," Multimedia Tools and Applicat., pp. 1-24, 2012.
    • (2012) Multimedia Tools and Applicat. , pp. 1-24
    • Saini, M.1    Atrey, P.K.2    Mehrotra, S.3    Kankanhalli, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.