Towards communication-efficient private location dependent queries
Abstract
References
Index Terms
- Towards communication-efficient private location dependent queries
Recommendations
Private queries in location based services: anonymizers are not necessary
SIGMOD '08: Proceedings of the 2008 ACM SIGMOD international conference on Management of dataMobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must not be disclosed. Existing solutions utilize a trusted anonymizer between ...
A differentially private algorithm for location data release
The rise of mobile technologies in recent years has led to large volumes of location information, which are valuable resources for knowledge discovery such as travel patterns mining and traffic analysis. However, location dataset has been confronted ...
A Hybrid Technique for Private Location-Based Queries with Database Protection
SSTD '09: Proceedings of the 11th International Symposium on Advances in Spatial and Temporal DatabasesMobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To protect user privacy, it is important not to disclose exact user coordinates to un-trusted entities that provide location-based ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- Conference Chairs:
- William Chu,
- W. Eric Wong,
- Program Chairs:
- Mathew J. Palakal,
- Chih-Cheng Hung
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigapp
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 114Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in