WEKO3
アイテム
Protecting Location Privacy with <i>K</i>-Confusing Paths Based on Dynamic Pseudonyms
https://ipsj.ixsq.nii.ac.jp/records/86799
https://ipsj.ixsq.nii.ac.jp/records/86799efa9eb1d-51e0-4e6b-ad9b-0af998561665
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2012 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | SIG Technical Reports(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 2012-11-08 | |||||||
タイトル | ||||||||
タイトル | Protecting Location Privacy with <i>K</i>-Confusing Paths Based on Dynamic Pseudonyms | |||||||
タイトル | ||||||||
言語 | en | |||||||
タイトル | Protecting Location Privacy with <i>K</i>-Confusing Paths Based on Dynamic Pseudonyms | |||||||
言語 | ||||||||
言語 | eng | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | 位置情報 | |||||||
資源タイプ | ||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_18gh | |||||||
資源タイプ | technical report | |||||||
著者所属 | ||||||||
NTT Communication Science Laboratories, NTT Corporation | ||||||||
著者所属 | ||||||||
Institute of Statistical Mathematics | ||||||||
著者所属 | ||||||||
Institute of Statistical Mathematics | ||||||||
著者所属(英) | ||||||||
en | ||||||||
NTT Communication Science Laboratories, NTT Corporation | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Institute of Statistical Mathematics | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Institute of Statistical Mathematics | ||||||||
著者名 |
Ken, Mano
× Ken, Mano
|
|||||||
著者名(英) |
Ken, Mano
× Ken, Mano
|
|||||||
論文抄録 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | As smart phones with a GPS receiver have been becoming popular recently, many people have realized the issue of protecting their location privacy. Previous research on location privacy mainly focuses on anonymization techniques for removing identifiable information from users' location traces. Although anonymized location data is useful to many applications, such as traffic monitoring, we can provide a new class of location-based services by utilizing path information of mobile users. In this paper, we present a dynamic pseudonym scheme for constructing alternate possible paths of mobile users to protect their location privacy. We introduce a formal definition of location privacy for pseudonym-based location data sets and show an efficient verification algorithm for determining whether each user in a given location data set has sufficient number of possible paths to disguise the user's true movements. | |||||||
論文抄録(英) | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | As smart phones with a GPS receiver have been becoming popular recently, many people have realized the issue of protecting their location privacy. Previous research on location privacy mainly focuses on anonymization techniques for removing identifiable information from users' location traces. Although anonymized location data is useful to many applications, such as traffic monitoring, we can provide a new class of location-based services by utilizing path information of mobile users. In this paper, we present a dynamic pseudonym scheme for constructing alternate possible paths of mobile users to protect their location privacy. We introduce a formal definition of location privacy for pseudonym-based location data sets and show an efficient verification algorithm for determining whether each user in a given location data set has sufficient number of possible paths to disguise the user's true movements. | |||||||
書誌レコードID | ||||||||
収録物識別子タイプ | NCID | |||||||
収録物識別子 | AA11851388 | |||||||
書誌情報 |
研究報告 モバイルコンピューティングとユビキタス通信(MBL) 巻 2012-MBL-64, 号 13, p. 1-5, 発行日 2012-11-08 |
|||||||
Notice | ||||||||
SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc. | ||||||||
出版者 | ||||||||
言語 | ja | |||||||
出版者 | 情報処理学会 |