skip to main content
10.1145/1066116.1189037acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
Article

Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking

Published:05 May 2003Publication History
First page image

References

  1. {1} Nissanka B. Priyantha, Anit Chakraborty, and Hari Balakrishnan. The cricket location-support system. In Proceedings of the sixth annual international conference on Mobile computing and networking, pages 32-43. ACM Press, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. {2} I. Getting. The global positioning system. IEEE Spectrum , 30(12): 36-47, December 1993.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. {3} Mike Spreitzer and Marvin Theimer. Providing location information in a ubiquitous computing environment (panel session). In Proceedings of the fourteenth ACM symposium on Operating systems principles, pages 270- 283. ACM Press, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. {4} Andy Harter, Andy Hopper, Pete Steggles, Andy Ward, and Paul Webster. The anatomy of a context-aware application. In Mobile Computing and Networking, pages 59-68, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. {5} Rui Jose and Nigel Davies. Scalable and flexible location-based services for ubiquitous information access. In Proceedings of First International Symposium on Hand-held and Ubiquitous Computing, HUC'99, pages 52-66. Springer Verlag, 1999.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. {6} C. Bisdikian, J. Christensen, J. Davis II, M. Ebling, G. Hunt, W. Jerome, H. Lei, and S. Maes. Enabling location-based applications. In 1st Workshop on Mobile commerce, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. {7} P. A. Karger and Y. Frankel. Security and privacy threats to ITS. In Proceedings of the Second World Congress on Intelligent Transport Systems, volume 5, Yokohama, Japan, Nov 1995.Google ScholarGoogle Scholar
  8. {8} Roy Want, Andy Hopper, Veronica Falco, and Jonathan Gibbons. The active badge location system. ACM Transactions on Information Systems (TOIS), 10(1): 91-102, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. {9} Philip E. Agre. Transport informatics and the new landscape of privacy issues. Computer Professionals for Social Responsibility (CPSR) Newsletter, 13(3), 1995.Google ScholarGoogle Scholar
  10. {10} Marc Langheinrich. Privacy by design - principles of privacy-aware ubiquitous systems. In G.D. Abowd, B. Brumitt, and S. Shafer, editors, Ubicomp 2001 Proceedings , volume 2201 of Lecture Notes in Computer Science , pages 273-291. Springer, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. {11} Andreas Pfitzmann and Marit Koehntopp. Anonymity, unobservability, and pseudonymity --a proposal for terminology. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies -- Proceedings of the International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS. Springer, 2000.Google ScholarGoogle Scholar
  12. {12} Michael K. Reiter and Aviel D. Rubin. Crowds: anonymity for Web transactions. ACM Transactions on Information and System Security, 1(1): 66-92, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. {13} D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM (USA), 42(2): 39-41, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. {14} NextBus Information Systems. Nextbus website. 1321 67th Street, Emeryville, CA 94608, USA, http://www.nextbus.com, Oct 2002.Google ScholarGoogle Scholar
  15. {15} J. Cuellar, J. Morris, and D. Mulligan. Internet engineering task force geopriv requirements. http://www.ietf.org/html.charters/geopriv-charter.html, Oct 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. {16} Sastry Duri, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, and Jung-Mu Tang. Framework for security and privacy in automotive telematics. In Proceedings of the second international workshop on Mobile commerce, pages 25-32. ACM Press, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. {17} Jalal Al-Muhtadi, Roy Campbell, Apu Kapadia, M. Dennis Mickunas, and Seung Yi. Routing through the mist: Privacy preserving communication in ubiquitous computing environments. In Proceedigns of IEEE International Conference of Distributed Computing Systems (ICDCS), pages 65-74, Vienna, Austria, Jul 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. {18} Asim Smailagic and David Kogan. Location sensing and privacy in a context-aware computing environment. IEEE Wireless Communications, 9(5): 10-17, Oct 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. {19} David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2): 84-90, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. {20} A. Pfitzmann, B. Pfitzmann, and M. Waidner. Isdnmixes: Untraceable communication with very small bandwidth overhead. In Wolfgang Effelsberg, Hans Werner Meuer, and Günter Müller, editors, Proceedings of Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI/ITG-Fachtagung, volume 267 of Informatik-Fachberichte , Mannheim, Germany, Feb 1991. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. {21} David Goldschlag, Michael Reed, and Paul Syverson. Onion routing. Communications of the ACM, 42(2): 39- 41, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. {22} Anonymizer. Anonymizer website. 5694 Mission Center Road #426, San Diego, CA 92108-4380, http://www.anonymizer.com, 2000.Google ScholarGoogle Scholar
  23. {23} Clay Shields and Brian Neil Levine. A protocol for anonymous communication over the internet. In Proceedings of the 7th ACM conference on Computer and communications security, pages 33-42. ACM Press, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. {24} Yong Guan, Xinwen Fu, Riccardo Bettati, and Wei Zhao. A quantitative analysis of anonymous communications. IEEE Transactions on Reliability, (to appear).Google ScholarGoogle Scholar
  25. {25} Nabil R. Adam and John C. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys (CSUR), 21(4): 515-556, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. {26} Rakesh Agrawal and Ramakrishnan Srikant. Privacy-preserving data mining. In Proceedings of the ACM SIGMOD Conference on Management of Data, pages 439- 450. ACM Press, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. {27} Dakshi Agrawal and Charu C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the twentieth ACM SIGMODSIGACT-SIGART symposium on Principles of database systems, pages 247-255. ACM Press, May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. {28} P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.Google ScholarGoogle Scholar
  29. {29} J. Reed, K. Krizman, B. Woerner, and T. Rappaport. An overview of the challenges and progress in meeting the e-911 requirement for location service. IEEE Personal Communications Magazine, 5(3): 30-37, April 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. {30} Tele Atlas North America, Inc. Geocode web-site. 1605 Adams Drive, Menlo Park, CA 94025, http://www.geocode.com/, Oct 2002.Google ScholarGoogle Scholar
  31. {31} J. A. Simpson and E. S. C. Weiner, editors. Oxford English Dictionary, Second Edition. Clarendon Press, 1989.Google ScholarGoogle Scholar
  32. {32} Hanan Samet. The Design and Analysis of Spatial Data Structures. Addison-Wesley, Reading, MA, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. {33} U.S. Geological Survey (USGS). Spatial data transfer standard. 12201 Sunrise Valley Drive, Reston, VA 20192, USA, http://mcmcweb.er.usgs.gov/sdts/, 1995.Google ScholarGoogle Scholar
  34. {34} U.S. Geological Survey (USGS). Digital line graph data. 12201 Sunrise Valley Drive, Reston, VA 20192, USA, http://edc.usgs.gov/geodata/, Oct 2002.Google ScholarGoogle Scholar
  35. {35} DCROG. Denver regional council of governments: Denver regional travel behavior inventory, 2001. 2480 W. 26th Avenue, Suite 200B, Denver, CO 80211-5580.Google ScholarGoogle Scholar
  36. {36} Colorado Department of Transportation. Traffic statistics & data. Public Relations Office, 4201 E Arkansas Ave, Denver, CO 80222, http://www.dot.state.co.us/, Oct 2002.Google ScholarGoogle Scholar
  1. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiSys '03: Proceedings of the 1st international conference on Mobile systems, applications and services
      May 2003
      180 pages
      ISBN:9781450377973
      DOI:10.1145/1066116

      Copyright © 2003 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 May 2003

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      MobiSys '03 Paper Acceptance Rate23of153submissions,15%Overall Acceptance Rate274of1,679submissions,16%

      Upcoming Conference

      MOBISYS '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader