From Data Privacy to Location Privacy. Wang, T. & Liu, L. In Machine Learning in Cyber Trust, pages 217-247, 4, 2009. Springer.
From Data Privacy to Location Privacy [link]Website  abstract   bibtex   
Over the past decade, the research on data privacy has achieved consid- erable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algo- rithms and methods have been developed to implement the proposed privacy prin- ciples, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close ex- amination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protec- tion. As a special form of data privacy, location privacy possesses its unique char- acteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on loca- tion privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.
@inProceedings{
 title = {From Data Privacy to Location Privacy},
 type = {inProceedings},
 year = {2009},
 identifiers = {[object Object]},
 keywords = {privacy,reading-group},
 pages = {217-247},
 websites = {http://www.springer.com/computer/security+and+cryptology/book/978-0-387-88734-0},
 month = {4},
 publisher = {Springer},
 chapter = {9},
 editors = {[object Object],[object Object]},
 id = {94bf48e7-2ed1-3627-9fe3-a04dd3ee093a},
 created = {2018-07-12T21:32:13.982Z},
 file_attached = {false},
 profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
 group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
 last_modified = {2018-07-12T21:32:13.982Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 citation_key = {wang:dataprivacy2009},
 source_type = {inproceedings},
 private_publication = {false},
 abstract = {Over the past decade, the research on data privacy has achieved consid- erable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algo- rithms and methods have been developed to implement the proposed privacy prin- ciples, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close ex- amination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protec- tion. As a special form of data privacy, location privacy possesses its unique char- acteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on loca- tion privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.},
 bibtype = {inProceedings},
 author = {Wang, Ting and Liu, Ling},
 booktitle = {Machine Learning in Cyber Trust}
}

Downloads: 0