Protecting Privacy Against Location-Based Personal Identification
نویسندگان
چکیده
This paper presents a preliminary investigation on the privacy issues involved in the use of location-based services. It is argued that even if the user identity is not explicitly released to the service provider, the geo-localized history of user-requests can act as a quasi-identifier and may be used to access sensitive information about specific individuals. The paper formally defines a framework to evaluate the risk in revealing a user identity via location information and presents preliminary ideas about algorithms to prevent this to happen.
منابع مشابه
Protecting Location Privacy through Semantics-aware Obfuscation Techniques
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. To protect location privacy the usual strategy is to obfuscate the actual position of the user with a coarse location and then forward the obfuscated location to the LBS provider. Existing techniques for location obfuscation are only based on geometric methods...
متن کاملimprovement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملPrivacy Enhanced Active RFID Tag
In the coming future ubiquitous society, Radio Frequency Identification (RFID) tags will be affixed to every product and person. This technology is anticipated to be a key technology that will be utilized by various ubiquitous services where these tags will be used to identify things and people and will automatically take advantage of contextual information such as location. On the other hand, ...
متن کاملPrivacy through Fake yet Semantically Real Traces
Camouflaging data by generating fake information is a wellknown obfuscation technique for protecting data privacy. The effectiveness of this technique in protecting users’ privacy highly depends on the resemblance of fake information to reality, such that an adversary cannot easily filter such fake information out. In this paper, we focus on a very sensitive and increasingly exposed type of dat...
متن کاملPersonal Information Privacy and Internet Technology
Personal information privacy is arguably the most important issue facing the growth and prosperity of the Internet, especially of e-commerce. Protecting personal information privacy has ignited a debate that pits privacy advocates against technology growth enthusiasts. This paper explores personal information privacy on the Internet in terms of the technological challenges to personal informati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005