Abstract
This chapter discusses privacy in location systems and the impact for indoor location-based services. It introduces the main approaches for providing privacy including multiparty computation, k-anonymity, l-diversity, spatial and temporal cloaking, differential privacy, and private information retrieval.
Privacy is effective ability to misrepresent yourself.
Dan Geer
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Beimel, A., Nissim, K., Omri, E.: Distributed private data analysis: simultaneously solving how and what. In: Advances in Cryptology—CRYPTO 2008, pp. 451–468. Springer, Berlin (2008)
Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)
Dwork, C.: Differential privacy: a survey of results. In: Theory and Applications of Models of Computation, pp. 1–19. Springer, Berlin (2008)
Krumm, J.: A survey of computational location privacy. Pers. Ubiquitous Comput. 13(6), 391–399 (2009)
Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE, vol. 7, pp. 106–115 (2007)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-Diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)
Sweeney, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)
Yao, A.C.C.: Protocols for secure computations. In: FOCS, vol. 82, pp. 160–164 (1982)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Werner, M. (2014). Privacy and Security Considerations. In: Indoor Location-Based Services. Springer, Cham. https://doi.org/10.1007/978-3-319-10699-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-10699-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10698-4
Online ISBN: 978-3-319-10699-1
eBook Packages: Computer ScienceComputer Science (R0)