A growing number of applications and services include among their parameters a spatio-temporal characterization of some of the involved entities. These applications are enabled by positioning technologies that can provide real-time data about the location of moving objects. Depending on the considered adversary model, location data management for these applications requires the application of privacy preserving techniques at transaction time (online techniques), or upon the subsequent release of portions of transaction history (offline techniques). This chapter provides a brief survey of proposals for both classes of techniques, further classifying them accordingly to their specific goal, reference architecture, and evaluation methods. A technically deeper discussion is devoted to online anonymization when the adversary can recognize traces of requests from the same user, and to online location obfuscation in proximity services, like friend-finder services.

Privacy and anonymity in location data management / C. Bettini, S. Mascetti, D. Freni, X.S. Wang, S. Jajodia - In: Privacy-aware knowledge discovery : novel applications and new techniques / [a cura di] F. Bonchi, E. Ferrari. - Boca Raton : CRC Press, 2011. - ISBN 9781439803653.

Privacy and anonymity in location data management

C. Bettini
Primo
;
S. Mascetti
Secondo
;
D. Freni;
2011

Abstract

A growing number of applications and services include among their parameters a spatio-temporal characterization of some of the involved entities. These applications are enabled by positioning technologies that can provide real-time data about the location of moving objects. Depending on the considered adversary model, location data management for these applications requires the application of privacy preserving techniques at transaction time (online techniques), or upon the subsequent release of portions of transaction history (offline techniques). This chapter provides a brief survey of proposals for both classes of techniques, further classifying them accordingly to their specific goal, reference architecture, and evaluation methods. A technically deeper discussion is devoted to online anonymization when the adversary can recognize traces of requests from the same user, and to online location obfuscation in proximity services, like friend-finder services.
Settore INF/01 - Informatica
2011
Book Part (author)
File in questo prodotto:
File Dimensione Formato  
chapter.pdf

accesso riservato

Tipologia: Publisher's version/PDF
Dimensione 687.88 kB
Formato Adobe PDF
687.88 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/154176
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact