Simulation of obfuscation and negotiation for location privacy
AuthorDUCKHAM, MATT; KULIK, LARS
Source TitleLecture Notes in Computer Science 3693
AffiliationEngineering: Department of Geomatics
Document TypeBook Chapter
CitationsDuckham, M.& Kulik, L. (2005). Simulation of obfuscation and negotiation for location privacy. In D. Mark & A. G. Cohn (Eds.) Lecture Notes in Computer Science 3693 (pp. 31-48). Springer.
Access StatusThis item is currently not available from this repository
Publisher's version is restricted access in accordance with the publisher's policy. The original publication is available at http://www.springerlink.com
Current mobile computing systems can automatically sense and communicatedetailed data about a person’s location. Location privacy is an urgent researchissue because concerns about privacy are seen to be inhibiting the growthof mobile computing. This paper investigates a new technique for safeguardinglocation privacy, called obfuscation, which protects a person’s location privacy bydegrading the quality of information about that person’s location. Obfuscation isbased on spatial imperfection and offers an orthogonal approach to conventionaltechniques for safeguarding information about a person’s location. Imprecisionand inaccuracy are two types of imperfection that may be used to achieve obfuscation.A set of simulations are used to empirically evaluate different obfuscationstrategies based on imprecision and inaccuracy. The results show that obfuscationcan enable high quality of service in concert with high levels of privacy.
- Click on "Export Reference in RIS Format" and choose "open with... Endnote".
- Click on "Export Reference in RIS Format". Login to Refworks, go to References => Import References