메뉴 건너뛰기




Volumn , Issue , 2014, Pages 321-332

An efficient privacy-preserving system for monitoring mobile users: Making searchable encryption practical

Author keywords

Location privacy; Pairing based cryptography

Indexed keywords

DATA PRIVACY; DISASTERS;

EID: 84898970573     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2557547.2557559     Document Type: Conference Paper
Times cited : (35)

References (31)
  • 1
    • 0016994626 scopus 로고
    • Efficient generation of the binary reflected gray code and its applications
    • Sept
    • J. R. Bitner, G. Ehrlich, and E. M. Reingold. Efficient generation of the binary reflected gray code and its applications. Commun. ACM, 19(9):517-521, Sept. 1976.
    • (1976) Commun ACM , vol.19 , Issue.9 , pp. 517-521
    • Bitner, J.R.1    Ehrlich, G.2    Reingold, E.M.3
  • 5
    • 33746104815 scopus 로고    scopus 로고
    • Fully collusion resistant traitor tracing with short ciphertexts and private keys
    • D. Boneh, A. Sahai, and B. Waters. Fully collusion resistant traitor tracing with short ciphertexts and private keys. In EUROCRYPT 2006, volume 4004 of LNCS, pages 573-592, 2006.
    • (2006) EUROCRYPT 2006, Volume 4004 of LNCS , pp. 573-592
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 7
    • 0036606530 scopus 로고    scopus 로고
    • A framework for generating network-based moving objects
    • T. Brinkhoff. A Framework for Generating Network-based Moving Objects. GeoInformatica, 6(2):153-180, 2002.
    • (2002) GeoInformatica , vol.6 , Issue.2 , pp. 153-180
    • Brinkhoff, T.1
  • 9
    • 37849011436 scopus 로고    scopus 로고
    • Enabling private continuous queries for revealed user locations
    • C.-Y. Chow and M. F. Mokbel. Enabling Private Continuous Queries for Revealed User Locations. In SSTD, pages 258-275, 2007.
    • (2007) SSTD , pp. 258-275
    • Chow, C.-Y.1    Mokbel, M.F.2
  • 12
    • 77951688595 scopus 로고    scopus 로고
    • Differential privacy in new settings
    • C. Dwork. Differential privacy in new settings. In SODA, pages 174-183, 2010.
    • (2010) SODA , pp. 174-183
    • Dwork, C.1
  • 13
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284, 2006.
    • (2006) TCC , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 14
    • 27944454864 scopus 로고    scopus 로고
    • Location privacy in mobile systems: A personalized anonymization model
    • B. Gedik and L. Liu. Location Privacy in Mobile Systems: A Personalized Anonymization Model. In Proc. of ICDCS, pages 620-629, 2005.
    • (2005) Proc. of ICDCS , pp. 620-629
    • Gedik, B.1    Liu, L.2
  • 15
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-Anonymity: Architecture and algorithms
    • B. Gedik and L. Liu. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE TMC, 7(1):1-18, 2008.
    • (2008) IEEE TMC , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 17
    • 35348924316 scopus 로고    scopus 로고
    • PRIVE: Anonymous location-based queries in distributed mobile systems
    • G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: Anonymous Location-based Queries in Distributed Mobile Systems. In WWW, 2007.
    • (2007) WWW
    • Ghinita, G.1    Kalnis, P.2    Skiadopoulos, S.3
  • 19
    • 1642286258 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In USENIX MobiSys, 2003.
    • (2003) USENIX MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 20
    • 2342562393 scopus 로고    scopus 로고
    • Protecting privacy in continuous location-tracking applications
    • M. Gruteser and X. Liu. Protecting Privacy in Continuous Location-Tracking Applications. IEEE Security and Privacy, 2:28-34, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , pp. 28-34
    • Gruteser, M.1    Liu, X.2
  • 21
    • 35648982949 scopus 로고    scopus 로고
    • Preserving location-based identity inference in anonymous spatial queries
    • P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preserving Location-based Identity Inference in Anonymous Spatial Queries. IEEE TKDE, 19(12), 2007.
    • (2007) IEEE TKDE , vol.19 , pp. 12
    • Kalnis, P.1    Ghinita, G.2    Mouratidis, K.3    Papadias, D.4
  • 22
    • 57149125534 scopus 로고    scopus 로고
    • Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
    • A. Khoshgozaran and C. Shahabi. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In SSTD, 2007.
    • (2007) SSTD
    • Khoshgozaran, A.1    Shahabi, C.2
  • 24
    • 84858038683 scopus 로고    scopus 로고
    • Secure and privacy preserving keyword searching for cloud storage services
    • May
    • Q. Liu, G. Wang, and J. Wu. Secure and privacy preserving keyword searching for cloud storage services. J. Network Computing Applications, 35(3):927-933, May 2012.
    • (2012) J. Network Computing Applications , vol.35 , Issue.3 , pp. 927-933
    • Liu, Q.1    Wang, G.2    Wu, J.3
  • 27
    • 22144445920 scopus 로고    scopus 로고
    • The weil pairing, and its efficient calculation
    • Sept
    • V. S. Miller. The weil pairing, and its efficient calculation. J. Cryptol., 17(4):235-261, Sept. 2004.
    • (2004) J. Cryptol. , vol.17 , Issue.4 , pp. 235-261
    • Miller, V.S.1
  • 28
    • 34547720006 scopus 로고    scopus 로고
    • The new casper: Query processing for location services without compromising privacy
    • M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The New Casper: Query Processing for Location Services without Compromising Privacy. In VLDB, 2006.
    • (2006) VLDB
    • Mokbel, M.F.1    Chow, C.-Y.2    Aref, W.G.3
  • 29
    • 0021644214 scopus 로고
    • The quadtree and related hierarchical data structures
    • June
    • H. Samet. The quadtree and related hierarchical data structures. ACM Comput. Surv., 16(2):187-260, June 1984.
    • (1984) ACM Comput. Surv. , vol.16 , Issue.2 , pp. 187-260
    • Samet, H.1
  • 31
    • 52649118020 scopus 로고    scopus 로고
    • Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
    • M. L. Yiu, C. Jensen, X. Huang, and H. Lu. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In International Conference on Data Engineering (ICDE), pages 366-375, 2008.
    • (2008) International Conference on Data Engineering (ICDE) , pp. 366-375
    • Yiu, M.L.1    Jensen, C.2    Huang, X.3    Lu, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.