One of the approaches to the problem of data-privacy protection is given by the application of obfuscation techniques; in many situations, however, context information can help an attacker to perform inference over obfuscated data and to refine the estimate of the sensitive data up to a violation of the original privacy requirements. We consider the problem in a location privacy protection set-up where the sensitive attribute to be protected is the position of a Location Based Service user, and where the location anonymization technique is cloaking, whereas the context, supporting inference attacks, consists in some landscape-related information, namely positional constraints. In this work we adopt the assumption that the anonymizer and the...
Part 3: Confidentiality and PrivacyInternational audienceAs location-based services emerge, many peo...
Abstract—The pervasive diffusion of mobile communication devices and the technical improvements of l...
In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware...
A prototypical case of data anonymization is location anonymization: here the most common data anony...
The popularity of context-aware services is improving the quality of life, while raising serious pri...
This paper proposes a user-centered location privacy game mechanism,which is aimed to generate corre...
The mainstream approach to protecting the privacy of mobile users in location-based services (LBSs) ...
Consider users who share their data (e.g., location) with an untrusted service provider to obtain a ...
Users data privacy is vital to their safety and trust. Protecting users’ data through secure protoco...
The mainstream approach to protecting the location-privacy of mobile users in location-based service...
It is well understood that the huge volumes of data captured in recent years have the potential to u...
Usage of locational data is getting more popular day by day. Location-aware application, context awa...
International audienceCo-location information about users is increasingly available online. For inst...
In Location-Based Services (LBSs) platforms, such as Foursquare and Swarm, the submitted position fo...
This is a post-print of an article whose final and definitive form has been published in Lecture Not...
Part 3: Confidentiality and PrivacyInternational audienceAs location-based services emerge, many peo...
Abstract—The pervasive diffusion of mobile communication devices and the technical improvements of l...
In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware...
A prototypical case of data anonymization is location anonymization: here the most common data anony...
The popularity of context-aware services is improving the quality of life, while raising serious pri...
This paper proposes a user-centered location privacy game mechanism,which is aimed to generate corre...
The mainstream approach to protecting the privacy of mobile users in location-based services (LBSs) ...
Consider users who share their data (e.g., location) with an untrusted service provider to obtain a ...
Users data privacy is vital to their safety and trust. Protecting users’ data through secure protoco...
The mainstream approach to protecting the location-privacy of mobile users in location-based service...
It is well understood that the huge volumes of data captured in recent years have the potential to u...
Usage of locational data is getting more popular day by day. Location-aware application, context awa...
International audienceCo-location information about users is increasingly available online. For inst...
In Location-Based Services (LBSs) platforms, such as Foursquare and Swarm, the submitted position fo...
This is a post-print of an article whose final and definitive form has been published in Lecture Not...
Part 3: Confidentiality and PrivacyInternational audienceAs location-based services emerge, many peo...
Abstract—The pervasive diffusion of mobile communication devices and the technical improvements of l...
In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware...