Location privacy in emerging network-based applications

作者: Weisong Shi , Loren Schwiebert , Yong Xi

DOI:

关键词:

摘要: With the wide spread of computer systems and networks, privacy has become an issue that increasingly attracts attention. In wireless sensor location event source may be subject to unintentional disclosure through traffic analysis by attacker. vehicular authentication leaves a trail tie driver sequence time space coordinates. cloud-based navigation system, information sensitive itinerary is disclosed. Those scenarios have shown protection far-reaching problem could span many different aspects computer/network especially on diversified landscape such systems. To address protection, we propose look at from three aspects. First, represents one class problems. This because in general, encryption can applied protect being transmitted but pattern transmission harder hide due other constraints. To defeat analysis, it necessary identify those constraints decide trade-off between them protection. We threat within network directly related with routing protocol. Thus completely remove pattern, use random walk threat. Second, generally required establish identities interacting parties electronical communication. But unnecessarily reveals private when network. introduce tunable anonymity, both asymmetric symmetric primitives, into process so provides $k$-anonymity. further extend scenario mobile scenarios. At last, often perceived shared order obtain certain services. For example, destination sent for looking up shortest path them. show possible apply retrieval service provider knows whom provided accounting purposes, not details service. In represent some basic issues arising using Our approaches, while innovative discussed hand, are general enough similar

参考文章(90)
Zygmunt J. Haas, Rimon Barr, An efficient, unifying approach to simulation using virtual machines Cornell University. ,(2004)
Bogdan Carbunar, Radu Sion, On the Practicality of Private Information Retrieval. network and distributed system security symposium. ,(2007)
Ling Liu, Mustaque Ahamad, Aameek Singh, Privacy analysis for data sharing in *nix systems usenix annual technical conference. pp. 22- 22 ,(2006)
Kari A Funderburg, UPDATE ON INTELLIGENT VEHICLES AND INTERSECTIONS Public roads. ,vol. 67, pp. 34- 39 ,(2004)
Steven Michael Bellovin, William R. Cheswick, Privacy-Enhanced Searches Using Encrypted Bloom Filters IACR Cryptology ePrint Archive. ,vol. 2004, pp. 22- ,(2007) , 10.7916/D8MK6MR2
James A. Landay, Jason I. Hong, Xiaodong Jiang, Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing ubiquitous computing. pp. 176- 193 ,(2002) , 10.5555/647988.741485
Victoria Bellotti, Abigail Sellen, Design for privacy in ubiquitous computing environments european conference on computer supported cooperative work. pp. 77- 92 ,(1993) , 10.1007/978-94-011-2094-4_6