000 | 04601nam a2200709 i 4500 | ||
---|---|---|---|
001 | 6813298 | ||
003 | IEEE | ||
005 | 20200413152909.0 | ||
006 | m eo d | ||
007 | cr cn |||m|||a | ||
008 | 130521s2013 caua foab 000 0 eng d | ||
020 | _a9781627051507 (electronic bk.) | ||
020 | _z9781627051491 (pbk.) | ||
024 | 7 |
_a10.2200/S00485ED1V01Y201303SPT004 _2doi |
|
035 | _a(CaBNVSL)swl00402437 | ||
035 | _a(OCoLC)844063346 | ||
040 |
_aCaBNVSL _cCaBNVSL _dCaBNVSL |
||
050 | 4 |
_aTK5105.65 _b.G456 2013 |
|
082 | 0 | 4 |
_a910.285 _223 |
090 |
_a _bMoCl _e201303SPT004 |
||
100 | 1 | _aGhinita, Gabriel. | |
245 | 1 | 0 |
_aPrivacy for location-based services _h[electronic resource] / _cGabriel Ghinita. |
260 |
_aSan Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) : _bMorgan & Claypool, _cc2013. |
||
300 |
_a1 electronic text (xi, 73 p.) : _bill., digital file. |
||
490 | 1 |
_aSynthesis lectures on information security, privacy, & trust, _x1945-9750 ; _v# 4 |
|
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat Reader. | ||
500 | _aPart of: Synthesis digital library of engineering and computer science. | ||
500 | _aSeries from website. | ||
504 | _aIncludes bibliographical references (p. 67-71). | ||
505 | 0 | _a1. Introduction -- | |
505 | 8 | _a2. Privacy-preserving spatial transformations -- 2.1 Two-tier spatial transformations -- 2.2 Three-tier spatial transformations -- 2.3 Discussion -- | |
505 | 8 | _a3. Cryptographic approaches -- 3.1 A primer on computational PIR -- 3.2 Spatial queries with PIR -- 3.3 Protocols for approximate and exact NN with PIR -- 3.4 Comparison with geometric transformations -- | |
505 | 8 | _a4. Hybrid approaches -- 4.1 Privacy model -- 4.2 System overview -- 4.3 Private evaluation of point-rectangle enclosure -- 4.4 Private evaluation of point-convex-polygon enclosure -- | |
505 | 8 | _a5. Private matching of spatial datasets -- 5.1 Problem formulation -- 5.2 Dataset mapping -- 5.3 Join processing -- 5.4 Enhancing privacy by use of Chebyshev distance -- | |
505 | 8 | _a6. Trajectory anonymization -- 6.1 Publishing independent location samples -- 6.2 Publishing individual trajectories -- | |
505 | 8 | _a7. Differentially private publication of spatial datasets -- 7.1 A primer on differential privacy -- 7.2 Publication of static datasets of locations -- 7.2.1 Data-independent decompositions: quad-trees -- 7.2.2 Data-dependent decompositions: kd-trees -- 7.3 Publication of trajectory datasets -- | |
505 | 8 | _a8. Conclusions -- Bibliography -- Author's biography. | |
506 | 1 | _aAbstract freely available; full-text restricted to subscribers or individual document purchasers. | |
510 | 0 | _aCompendex | |
510 | 0 | _aINSPEC | |
510 | 0 | _aGoogle scholar | |
510 | 0 | _aGoogle book search | |
520 | 3 | _aSharing of location data enables numerous exciting applications, such as location-based queries, location-based social recommendations, monitoring of traffic and air pollution levels, etc. Disclosing exact user locations raises serious privacy concerns, as locations may give away sensitive information about individuals' health status, alternative lifestyles, political and religious affiliations, etc. Preserving location privacy is an essential requirement towards the successful deployment of location-based applications. These lecture notes provide an overview of the state-of-the-art in location privacy protection. A diverse body of solutions is reviewed, including methods that use location generalization, cryptographic techniques or differential privacy. The most prominent results are discussed, and promising directions for future work are identified. | |
530 | _aAlso available in print. | ||
588 | _aTitle from PDF t.p. (viewed on May 21, 2013). | ||
650 | 0 |
_aLocation-based services _xSecurity measures. |
|
650 | 0 |
_aMobile computing _xAccess control. |
|
653 | _aprivacy | ||
653 | _aanonymity | ||
653 | _asecurity | ||
653 | _ahomomorphic cryptography | ||
653 | _aPIR | ||
653 | _adifferential privacy | ||
653 | _aspatial databases | ||
653 | _aGIS | ||
776 | 0 | 8 |
_iPrint version: _z9781627051491 |
830 | 0 | _aSynthesis digital library of engineering and computer science. | |
830 | 0 |
_aSynthesis lectures on information security, privacy, and trust ; _v# 4. _x1945-9750 |
|
856 | 4 | 2 |
_3Abstract with links to resource _uhttp://ieeexplore.ieee.org/servlet/opac?bknumber=6813298 |
856 | 4 | 0 |
_3Abstract with links to full text _uhttp://dx.doi.org/10.2200/S00485ED1V01Y201303SPT004 |
999 |
_c561988 _d561988 |