Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Location privacy in relation to trusted peers
KTH, School of Computer Science and Communication (CSC), Theoretical Computer Science, TCS.ORCID iD: 0000-0002-7102-8153
2012 (English)In: Security and Trust Management, Springer Berlin/Heidelberg, 2012, Vol. 7170 LNCS, 106-121 p.Conference paper, Published paper (Refereed)
Abstract [en]

One common assumption when defining location privacy metrics is that one is dealing with attackers who have the objective of re-identifying an individual out of an anonymized data set. However, in today's communication scenarios, user communication and information exchange with (partially) trusted peers is very common, e.g., in communication via social applications. When disclosing voluntarily a single observation to a (partially) trusted communication peer, the user's privacy seems to be unharmed. However, location data is able to transport much more information than the simple fact of a user being at a specific location. Hence, a user-centric privacy metric is required in order to measure the extent of exposure by releasing (a set of) location observations. The goal of such a metric is to enable individuals to estimate the privacy loss caused by disclosing further location information in a specific communication scenario and thus enabling the user to make informed choices, e.g., choose the right protection mechanism.

Place, publisher, year, edition, pages
Springer Berlin/Heidelberg, 2012. Vol. 7170 LNCS, 106-121 p.
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 7170
Keyword [en]
Data sets, Information exchanges, Location data, Location information, Location privacy, Protection mechanisms, Specific location, User communication, User-centric, Artificial intelligence, Communication
National Category
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-100031DOI: 10.1007/978-3-642-29963-6_9Scopus ID: 2-s2.0-84861082429ISBN: 978-364229962-9 (print)OAI: oai:DiVA.org:kth-100031DiVA: diva2:543115
Conference
7th International Workshop on Security and Trust Management, STM 2011;Copenhagen;27 June 2011 through 28 June 2011
Note

QC 20120806

Available from: 2012-08-06 Created: 2012-08-03 Last updated: 2013-09-12Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Authority records BETA

Greschbach, Benjamin

Search in DiVA

By author/editor
Greschbach, Benjamin
By organisation
Theoretical Computer Science, TCS
Computer Science

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 38 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf