A survey of computational location privacy

This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Personal and ubiquitous computing 2009-08, Vol.13 (6), p.391-399
1. Verfasser: Krumm, John
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 399
container_issue 6
container_start_page 391
container_title Personal and ubiquitous computing
container_volume 13
creator Krumm, John
description This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples’ attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.
doi_str_mv 10.1007/s00779-008-0212-5
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_34928042</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1775681871</sourcerecordid><originalsourceid>FETCH-LOGICAL-c346t-4b92d41a13a3b70aa1a1ce157ae106243c857380127bae894deab5192c29526d3</originalsourceid><addsrcrecordid>eNp1kE9LAzEQxYMoWKsfwNviwYMQnUmym82xFP9BwYuew2yaSsu2qcluod_e1BUFwcvMO_zeMO8xdolwiwD6LuWhDQeoOQgUvDxiI6xQc2VQH_9oMKfsLKUVAOpKVSN2MylSH3d-X4RF4cJ623fULcOG2qIN7ksW27jckdufs5MFtclffO8xe3u4f50-8dnL4_N0MuNOqqrjqjFirpBQkmw0EGXpPJaaPEIllHR1qWUNKHRDvjZq7qkp0QgnTCmquRyz6-HuNoaP3qfOrpfJ-baljQ99slIZUYMSGbz6A65CH_PryQqoTU4sMUM4QC6GlKJf2BxnTXFvEeyhOjtUZ3N19lCdLbNHDJ6U2c27j7-H_zd9AvYNbwo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>208961731</pqid></control><display><type>article</type><title>A survey of computational location privacy</title><source>Alma/SFX Local Collection</source><source>SpringerLink Journals - AutoHoldings</source><creator>Krumm, John</creator><creatorcontrib>Krumm, John</creatorcontrib><description>This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples’ attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.</description><identifier>ISSN: 1617-4909</identifier><identifier>EISSN: 1617-4917</identifier><identifier>DOI: 10.1007/s00779-008-0212-5</identifier><language>eng</language><publisher>London: Springer-Verlag</publisher><subject>Algorithms ; Computer Science ; Cybersecurity ; Geometry ; Location based services ; Mobile Computing ; Original Article ; Personal Computing ; Privacy ; User Interfaces and Human Computer Interaction</subject><ispartof>Personal and ubiquitous computing, 2009-08, Vol.13 (6), p.391-399</ispartof><rights>Springer-Verlag London Limited 2008</rights><rights>Springer-Verlag London Limited 2009</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c346t-4b92d41a13a3b70aa1a1ce157ae106243c857380127bae894deab5192c29526d3</citedby><cites>FETCH-LOGICAL-c346t-4b92d41a13a3b70aa1a1ce157ae106243c857380127bae894deab5192c29526d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s00779-008-0212-5$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s00779-008-0212-5$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Krumm, John</creatorcontrib><title>A survey of computational location privacy</title><title>Personal and ubiquitous computing</title><addtitle>Pers Ubiquit Comput</addtitle><description>This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples’ attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.</description><subject>Algorithms</subject><subject>Computer Science</subject><subject>Cybersecurity</subject><subject>Geometry</subject><subject>Location based services</subject><subject>Mobile Computing</subject><subject>Original Article</subject><subject>Personal Computing</subject><subject>Privacy</subject><subject>User Interfaces and Human Computer Interaction</subject><issn>1617-4909</issn><issn>1617-4917</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kE9LAzEQxYMoWKsfwNviwYMQnUmym82xFP9BwYuew2yaSsu2qcluod_e1BUFwcvMO_zeMO8xdolwiwD6LuWhDQeoOQgUvDxiI6xQc2VQH_9oMKfsLKUVAOpKVSN2MylSH3d-X4RF4cJ623fULcOG2qIN7ksW27jckdufs5MFtclffO8xe3u4f50-8dnL4_N0MuNOqqrjqjFirpBQkmw0EGXpPJaaPEIllHR1qWUNKHRDvjZq7qkp0QgnTCmquRyz6-HuNoaP3qfOrpfJ-baljQ99slIZUYMSGbz6A65CH_PryQqoTU4sMUM4QC6GlKJf2BxnTXFvEeyhOjtUZ3N19lCdLbNHDJ6U2c27j7-H_zd9AvYNbwo</recordid><startdate>20090801</startdate><enddate>20090801</enddate><creator>Krumm, John</creator><general>Springer-Verlag</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20090801</creationdate><title>A survey of computational location privacy</title><author>Krumm, John</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c346t-4b92d41a13a3b70aa1a1ce157ae106243c857380127bae894deab5192c29526d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Algorithms</topic><topic>Computer Science</topic><topic>Cybersecurity</topic><topic>Geometry</topic><topic>Location based services</topic><topic>Mobile Computing</topic><topic>Original Article</topic><topic>Personal Computing</topic><topic>Privacy</topic><topic>User Interfaces and Human Computer Interaction</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Krumm, John</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Personal and ubiquitous computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Krumm, John</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A survey of computational location privacy</atitle><jtitle>Personal and ubiquitous computing</jtitle><stitle>Pers Ubiquit Comput</stitle><date>2009-08-01</date><risdate>2009</risdate><volume>13</volume><issue>6</issue><spage>391</spage><epage>399</epage><pages>391-399</pages><issn>1617-4909</issn><eissn>1617-4917</eissn><abstract>This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples’ attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.</abstract><cop>London</cop><pub>Springer-Verlag</pub><doi>10.1007/s00779-008-0212-5</doi><tpages>9</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1617-4909
ispartof Personal and ubiquitous computing, 2009-08, Vol.13 (6), p.391-399
issn 1617-4909
1617-4917
language eng
recordid cdi_proquest_miscellaneous_34928042
source Alma/SFX Local Collection; SpringerLink Journals - AutoHoldings
subjects Algorithms
Computer Science
Cybersecurity
Geometry
Location based services
Mobile Computing
Original Article
Personal Computing
Privacy
User Interfaces and Human Computer Interaction
title A survey of computational location privacy
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T19%3A43%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20survey%20of%20computational%20location%20privacy&rft.jtitle=Personal%20and%20ubiquitous%20computing&rft.au=Krumm,%20John&rft.date=2009-08-01&rft.volume=13&rft.issue=6&rft.spage=391&rft.epage=399&rft.pages=391-399&rft.issn=1617-4909&rft.eissn=1617-4917&rft_id=info:doi/10.1007/s00779-008-0212-5&rft_dat=%3Cproquest_cross%3E1775681871%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=208961731&rft_id=info:pmid/&rfr_iscdi=true