From Data Privacy to Location Privacy. Wang, T. & Liu, L. In Machine Learning in Cyber Trust, pages 217-247, 4, 2009. Springer. Website abstract bibtex Over the past decade, the research on data privacy has achieved consid- erable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algo- rithms and methods have been developed to implement the proposed privacy prin- ciples, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close ex- amination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protec- tion. As a special form of data privacy, location privacy possesses its unique char- acteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on loca- tion privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.
@inProceedings{
title = {From Data Privacy to Location Privacy},
type = {inProceedings},
year = {2009},
identifiers = {[object Object]},
keywords = {privacy,reading-group},
pages = {217-247},
websites = {http://www.springer.com/computer/security+and+cryptology/book/978-0-387-88734-0},
month = {4},
publisher = {Springer},
chapter = {9},
editors = {[object Object],[object Object]},
id = {94bf48e7-2ed1-3627-9fe3-a04dd3ee093a},
created = {2018-07-12T21:32:13.982Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:32:13.982Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {wang:dataprivacy2009},
source_type = {inproceedings},
private_publication = {false},
abstract = {Over the past decade, the research on data privacy has achieved consid- erable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algo- rithms and methods have been developed to implement the proposed privacy prin- ciples, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close ex- amination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protec- tion. As a special form of data privacy, location privacy possesses its unique char- acteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on loca- tion privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.},
bibtype = {inProceedings},
author = {Wang, Ting and Liu, Ling},
booktitle = {Machine Learning in Cyber Trust}
}
Downloads: 0
{"_id":"5ijEPAdGySFGWa4FA","bibbaseid":"wang-liu-fromdataprivacytolocationprivacy-2009","downloads":0,"creationDate":"2019-02-15T15:15:01.051Z","title":"From Data Privacy to Location Privacy","author_short":["Wang, T.","Liu, L."],"year":2009,"bibtype":"inProceedings","biburl":null,"bibdata":{"title":"From Data Privacy to Location Privacy","type":"inProceedings","year":"2009","identifiers":"[object Object]","keywords":"privacy,reading-group","pages":"217-247","websites":"http://www.springer.com/computer/security+and+cryptology/book/978-0-387-88734-0","month":"4","publisher":"Springer","chapter":"9","editors":"[object Object],[object Object]","id":"94bf48e7-2ed1-3627-9fe3-a04dd3ee093a","created":"2018-07-12T21:32:13.982Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:32:13.982Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"wang:dataprivacy2009","source_type":"inproceedings","private_publication":false,"abstract":"Over the past decade, the research on data privacy has achieved consid- erable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algo- rithms and methods have been developed to implement the proposed privacy prin- ciples, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close ex- amination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protec- tion. As a special form of data privacy, location privacy possesses its unique char- acteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on loca- tion privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.","bibtype":"inProceedings","author":"Wang, Ting and Liu, Ling","booktitle":"Machine Learning in Cyber Trust","bibtex":"@inProceedings{\n title = {From Data Privacy to Location Privacy},\n type = {inProceedings},\n year = {2009},\n identifiers = {[object Object]},\n keywords = {privacy,reading-group},\n pages = {217-247},\n websites = {http://www.springer.com/computer/security+and+cryptology/book/978-0-387-88734-0},\n month = {4},\n publisher = {Springer},\n chapter = {9},\n editors = {[object Object],[object Object]},\n id = {94bf48e7-2ed1-3627-9fe3-a04dd3ee093a},\n created = {2018-07-12T21:32:13.982Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:32:13.982Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {wang:dataprivacy2009},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {Over the past decade, the research on data privacy has achieved consid- erable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algo- rithms and methods have been developed to implement the proposed privacy prin- ciples, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close ex- amination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protec- tion. As a special form of data privacy, location privacy possesses its unique char- acteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on loca- tion privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.},\n bibtype = {inProceedings},\n author = {Wang, Ting and Liu, Ling},\n booktitle = {Machine Learning in Cyber Trust}\n}","author_short":["Wang, T.","Liu, L."],"urls":{"Website":"http://www.springer.com/computer/security+and+cryptology/book/978-0-387-88734-0"},"bibbaseid":"wang-liu-fromdataprivacytolocationprivacy-2009","role":"author","keyword":["privacy","reading-group"],"downloads":0},"search_terms":["data","privacy","location","privacy","wang","liu"],"keywords":["privacy","reading-group"],"authorIDs":[]}