Simulation of obfuscation and negotiation for location privacy
Citations
Altmetric
Author
DUCKHAM, MATT; KULIK, LARSDate
2005Source Title
Lecture Notes in Computer Science 3693Publisher
SpringerAffiliation
Engineering: Department of GeomaticsMetadata
Show full item recordDocument Type
Book ChapterCitations
Duckham, M.& Kulik, L. (2005). Simulation of obfuscation and negotiation for location privacy. In D. Mark & A. G. Cohn (Eds.) Lecture Notes in Computer Science 3693 (pp. 31-48). Springer.Access Status
This item is currently not available from this repositoryDescription
Publisher's version is restricted access in accordance with the publisher's policy. The original publication is available at http://www.springerlink.com
Abstract
Current mobile computing systems can automatically sense and communicatedetailed data about a person’s location. Location privacy is an urgent researchissue because concerns about privacy are seen to be inhibiting the growthof mobile computing. This paper investigates a new technique for safeguardinglocation privacy, called obfuscation, which protects a person’s location privacy bydegrading the quality of information about that person’s location. Obfuscation isbased on spatial imperfection and offers an orthogonal approach to conventionaltechniques for safeguarding information about a person’s location. Imprecisionand inaccuracy are two types of imperfection that may be used to achieve obfuscation.A set of simulations are used to empirically evaluate different obfuscationstrategies based on imprecision and inaccuracy. The results show that obfuscationcan enable high quality of service in concert with high levels of privacy.
Export Reference in RIS Format
Endnote
- Click on "Export Reference in RIS Format" and choose "open with... Endnote".
Refworks
- Click on "Export Reference in RIS Format". Login to Refworks, go to References => Import References