Abstract | ||
---|---|---|
The continued growth in online services that provide users with content based on location presents a unique privacy concern for the user. Since the user cannot control the use of the data included in his network transactions once they leave the device, nor can he control the response from the location-based system (LBS), he must assume that information is available to an unknown observer who could use the information to estimate the user's location. This paper presents a cloaking system that preserves a user's location privacy by submitting multiple requests from disparate false locations to the LBS in rapid succession in order to confuse the observer and meet the user's pre-determined location privacy threshold. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/HICSS.2008.234 | HICSS |
Keywords | Field | DocType |
multiple request,disparate false location,wireless devices,location privacy,pre-determined location privacy threshold,unknown observer,cloaking system,network transaction,unique privacy concern,continued growth,location-based system,mobile computing,data privacy,wireless sensor networks | Mobile computing,Cloaking,Wireless,Computer security,Computer science,Computer network,Observer (quantum physics),Information privacy,Pound (mass),Wireless sensor network,Privacy software | Conference |
ISBN | Citations | PageRank |
0-7695-3075-8 | 3 | 0.41 |
References | Authors | |
5 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Calvert L. Bowen Iii | 1 | 3 | 0.41 |
David R. Raymond | 2 | 177 | 7.97 |
Thomas L. Martin | 3 | 201 | 24.17 |