메뉴 건너뛰기




Volumn 15, Issue 4, 2018, Pages 646-660

Privacy leakage of location sharing in mobile social networks: Attacks and defense

Author keywords

Location privacy; mobile social networks; privacy protection

Indexed keywords

LARGE DATASET; POPULATION STATISTICS; SOCIAL NETWORKING (ONLINE);

EID: 85050383382     PISSN: 15455971     EISSN: 19410018     Source Type: Journal    
DOI: 10.1109/TDSC.2016.2604383     Document Type: Article
Times cited : (153)

References (50)
  • 2
    • 78649999089 scopus 로고    scopus 로고
    • Rethinking location sharing: Exploring the implications of socialdriven versus purpose-driven location sharing
    • K. P. Tang, J. Lin, J. I. Hong, D. P. Siewiorek, and N. Sadeh, "Rethinking location sharing: Exploring the implications of socialdriven versus purpose-driven location sharing, " in Proc. 12th ACM Int. Conf. Ubiquitous Comput., 2010, pp. 85-94.
    • (2010) Proc. 12th ACM Int. Conf. Ubiquitous Comput. , pp. 85-94
    • Tang, K.P.1    Lin, J.2    Hong, J.I.3    Siewiorek, D.P.4    Sadeh, N.5
  • 3
    • 85050381844 scopus 로고    scopus 로고
    • T. Xiang. (2014). [Online]. Available: http://technode. com
    • (2014)
    • Xiang, T.1
  • 4
    • 85050381470 scopus 로고    scopus 로고
    • Skout 3. 4. 3 apk meet, chat, friend
    • Apk Apps, "Skout 3. 4. 3 Apk Meet, Chat, Friend, " (2014). [Online]. Available: http://www. apk4. net/applications/social-applications/ skout-3-4-3-apk-meet-chat-friend
    • (2014) Apk Apps
  • 5
    • 84910676082 scopus 로고    scopus 로고
    • POSTER: Positioning attack on proximity-based people discovery
    • H. Feng and K. G. Shin, "POSTER: Positioning attack on proximity-based people discovery, " in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., 2014, pp. 1427-1429.
    • (2014) Proc. ACM SIGSAC Conf. Comput. Commun. Secur. , pp. 1427-1429
    • Feng, H.1    Shin, K.G.2
  • 7
    • 84943646932 scopus 로고    scopus 로고
    • All your location are belong to us: Breaking mobile social networks for automated user location tracking
    • M. Li, et al., "All your location are belong to us: Breaking mobile social networks for automated user location tracking, " in Proc. 15th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2014, pp. 43-52.
    • (2014) Proc. 15th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. , pp. 43-52
    • Li, M.1
  • 9
    • 84962579256 scopus 로고    scopus 로고
    • MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks
    • Jan. / Feb.
    • R. Yu, J. Kang, X. Huang, S. Xie, Y. Zhang, and S. Gjessing, "MixGroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks, " IEEE Trans. Depend. Sec. Comput., vol. 13, no. 1, pp. 93-105, Jan. /Feb. 2016.
    • (2016) IEEE Trans. Depend. Sec. Comput. , vol.13 , Issue.1 , pp. 93-105
    • Yu, R.1    Kang, J.2    Huang, X.3    Xie, S.4    Zhang, Y.5    Gjessing, S.6
  • 10
    • 84861631795 scopus 로고    scopus 로고
    • Location privacy preservation in collaborative spectrum sensing
    • S. Li, H. Zhu, Z. Gao, X. Guan, K. Xing, and X. Shen, "Location privacy preservation in collaborative spectrum sensing, " in Proc. IEEE INFOCOM, 2012, pp. 729-737.
    • (2012) Proc. IEEE INFOCOM , pp. 729-737
    • Li, S.1    Zhu, H.2    Gao, Z.3    Guan, X.4    Xing, K.5    Shen, X.6
  • 11
    • 84869476246 scopus 로고    scopus 로고
    • Deanonymizing mobility traces: Using social network as a side-channel
    • M. Srivatsa and M. Hicks, "Deanonymizing mobility traces: Using social network as a side-channel, " in Proc. ACM Conf. Comput. Commun. Secur., 2012, pp. 628-637.
    • (2012) Proc. ACM Conf. Comput. Commun. Secur. , pp. 628-637
    • Srivatsa, M.1    Hicks, M.2
  • 13
    • 84921923317 scopus 로고    scopus 로고
    • Control use of data to protect privacy
    • S. Landau, "Control use of data to protect privacy, " Science, vol. 347, no. 6221, pp. 504-406, 2015.
    • (2015) Science , vol.347 , Issue.6221 , pp. 406-504
    • Landau, S.1
  • 14
    • 84921898213 scopus 로고    scopus 로고
    • Privacy and human behavior in the age of information
    • A. Acquisti, L. Brandimarte, and G. Loewenstein, "Privacy and human behavior in the age of information, " Science, vol. 347, no. 6621, pp. 509-514, 2015.
    • (2015) Science , vol.347 , Issue.6621 , pp. 509-514
    • Acquisti, A.1    Brandimarte, L.2    Loewenstein, G.3
  • 17
    • 84877954564 scopus 로고    scopus 로고
    • Constructing and comparing user mobility profiles for location-based services
    • X. Chen, J. Pang, and R. Xue, "Constructing and comparing user mobility profiles for location-based services, " in Proc. 28th Annu. ACM Symp. Appl. Comput., 2013, pp. 261-266.
    • (2013) Proc. 28th Annu. ACM Symp. Appl. Comput. , pp. 261-266
    • Chen, X.1    Pang, J.2    Xue, R.3
  • 19
    • 80053584816 scopus 로고    scopus 로고
    • Anonymization of location data does not work: A large-scale measurement study
    • H. Zang and J. Bolot, "Anonymization of location data does not work: A large-scale measurement study, " in Proc. 17th Annu. Int. Conf. Mobile Comput. Netw., 2011, pp. 145-156.
    • (2011) Proc. 17th Annu. Int. Conf. Mobile Comput. Netw. , pp. 145-156
    • Zang, H.1    Bolot, J.2
  • 21
    • 77149139158 scopus 로고    scopus 로고
    • Limits of predictability in human mobility
    • C. Song, Z. Qu, N. Blumm, and A.-L. Barabasi, "Limits of predictability in human mobility, " Science, vol. 327, no. 5968, pp. 1018-1021, 2010.
    • (2010) Science , vol.327 , Issue.5968 , pp. 1018-1021
    • Song, C.1    Qu, Z.2    Blumm, N.3    Barabasi, A.-L.4
  • 23
    • 84867449261 scopus 로고    scopus 로고
    • Automatically characterizing places with opportunistic crowdsensing using smartphones
    • Y. Chon, N. D. Lane, F. Li, H. Cha, and F. Zhao, "Automatically characterizing places with opportunistic crowdsensing using smartphones, " in Proc. ACM Conf. Ubiquitous Comput., 2012, pp. 481-490.
    • (2012) Proc. ACM Conf. Ubiquitous Comput. , pp. 481-490
    • Chon, Y.1    Lane, N.D.2    Li, F.3    Cha, H.4    Zhao, F.5
  • 32
    • 85038216780 scopus 로고    scopus 로고
    • Learning-based jamming attack against low-duty-cycle networks
    • Nov.
    • Z. Yang, P. Cheng, and J. Chen, "Learning-based jamming attack against low-duty-cycle networks, " IEEE Trans. Depend. Sec. Comput., vol. PP, no. 99, p. 1, Nov. 2015, Doi: 10. 1109/TDSC. 2015. 2501288.
    • (2015) IEEE Trans. Depend. Sec. Comput. , vol.PP , Issue.99 , pp. 1
    • Yang, Z.1    Cheng, P.2    Chen, J.3
  • 33
    • 84940705050 scopus 로고    scopus 로고
    • Optimal DoS attack scheduling in wireless networked control system
    • May
    • H. Zhang, P. Cheng, L. Shi, and J. Chen, "Optimal DoS attack scheduling in wireless networked control system, " IEEE Trans. Control Syst. Technol., vol. 24, no. 3, pp. 843-852, May 2016.
    • (2016) IEEE Trans. Control Syst. Technol. , vol.24 , Issue.3 , pp. 843-852
    • Zhang, H.1    Cheng, P.2    Shi, L.3    Chen, J.4
  • 34
    • 84903591823 scopus 로고    scopus 로고
    • Enhancing spectral-energy efficiency for LTE-advanced heterogeneous networks: A users social pattern perspective
    • Apr.
    • X. Zhang, Y. Zhang, R. Yu, W. Wang, and M. Guizani, "Enhancing spectral-energy efficiency for LTE-advanced heterogeneous networks: A users social pattern perspective, " IEEE Wireless Commun., vol. 21, no. 2, pp. 10-17, Apr. 2014.
    • (2014) IEEE Wireless Commun. , vol.21 , Issue.2 , pp. 10-17
    • Zhang, X.1    Zhang, Y.2    Yu, R.3    Wang, W.4    Guizani, M.5
  • 35
    • 84905015149 scopus 로고    scopus 로고
    • Distributed resource allocation in cloud-based wireless multimedia social networks
    • Jul. / Aug.
    • G. Nan, et al., "Distributed resource allocation in cloud-based wireless multimedia social networks, " IEEE Netw. Mag., vol. 28, no. 4, pp. 74-80, Jul. /Aug. 2014.
    • (2014) IEEE Netw. Mag. , vol.28 , Issue.4 , pp. 74-80
    • Nan, G.1
  • 36
    • 84897583900 scopus 로고    scopus 로고
    • Stackelberg game for bandwidth allocation in cloud-based wireless live-streaming social networks
    • Mar.
    • G. Nan, Z. Mao, M. Yu, M. Li, H. Wang, and Y. Zhang, "Stackelberg game for bandwidth allocation in cloud-based wireless live-streaming social networks, " IEEE Syst. J., vol. 8, no. 1, pp. 256-267, Mar. 2014.
    • (2014) IEEE Syst. J. , vol.8 , Issue.1 , pp. 256-267
    • Nan, G.1    Mao, Z.2    Yu, M.3    Li, M.4    Wang, H.5    Zhang, Y.6
  • 37
    • 84966800500 scopus 로고    scopus 로고
    • De-anonymizing social networks: Using user interest as a side-channel
    • S. Lai, H. Li, H. Zhu, and N. Ruan, "De-anonymizing social networks: Using user interest as a side-channel, " in Proc. IEEE/CIC Int. Conf. Commun. China, 2015, pp. 1-5.
    • (2015) Proc. IEEE/CIC Int. Conf. Commun. China , pp. 1-5
    • Lai, S.1    Li, H.2    Zhu, H.3    Ruan, N.4
  • 39
    • 84896982446 scopus 로고    scopus 로고
    • Exploiting multimedia services in mobile social networks from security and privacy perspectives
    • Mar.
    • K. Zhang, X. Liang, X. Shen, and R. Lu, "Exploiting multimedia services in mobile social networks from security and privacy perspectives, " IEEE Commun. Mag., vol. 52, no. 3, pp. 58-65, Mar. 2014.
    • (2014) IEEE Commun. Mag. , vol.52 , Issue.3 , pp. 58-65
    • Zhang, K.1    Liang, X.2    Shen, X.3    Lu, R.4
  • 44
    • 84910633256 scopus 로고    scopus 로고
    • POSTER: LocMask: A location privacy protection framework in android system
    • Q. Xiao, et al., "POSTER: LocMask: A location privacy protection framework in android system, " in Proc. ACM Conf. Comput. Commun. Secur., 2014, pp. 1526-1528.
    • (2014) Proc. ACM Conf. Comput. Commun. Secur. , pp. 1526-1528
    • Xiao, Q.1
  • 45
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of locationbased services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald, "Anonymous usage of locationbased services through spatial and temporal cloaking, " in Proc. 1st Int. Conf. Mobile Syst. Appl. Services, 2003, pp. 31-42.
    • (2003) Proc. 1st Int. Conf. Mobile Syst. Appl. Services , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.