A survey of computational location privacy
This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the...
Gespeichert in:
Veröffentlicht in: | Personal and ubiquitous computing 2009-08, Vol.13 (6), p.391-399 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 399 |
---|---|
container_issue | 6 |
container_start_page | 391 |
container_title | Personal and ubiquitous computing |
container_volume | 13 |
creator | Krumm, John |
description | This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples’ attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats. |
doi_str_mv | 10.1007/s00779-008-0212-5 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_34928042</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1775681871</sourcerecordid><originalsourceid>FETCH-LOGICAL-c346t-4b92d41a13a3b70aa1a1ce157ae106243c857380127bae894deab5192c29526d3</originalsourceid><addsrcrecordid>eNp1kE9LAzEQxYMoWKsfwNviwYMQnUmym82xFP9BwYuew2yaSsu2qcluod_e1BUFwcvMO_zeMO8xdolwiwD6LuWhDQeoOQgUvDxiI6xQc2VQH_9oMKfsLKUVAOpKVSN2MylSH3d-X4RF4cJ623fULcOG2qIN7ksW27jckdufs5MFtclffO8xe3u4f50-8dnL4_N0MuNOqqrjqjFirpBQkmw0EGXpPJaaPEIllHR1qWUNKHRDvjZq7qkp0QgnTCmquRyz6-HuNoaP3qfOrpfJ-baljQ99slIZUYMSGbz6A65CH_PryQqoTU4sMUM4QC6GlKJf2BxnTXFvEeyhOjtUZ3N19lCdLbNHDJ6U2c27j7-H_zd9AvYNbwo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>208961731</pqid></control><display><type>article</type><title>A survey of computational location privacy</title><source>Alma/SFX Local Collection</source><source>SpringerLink Journals - AutoHoldings</source><creator>Krumm, John</creator><creatorcontrib>Krumm, John</creatorcontrib><description>This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples’ attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.</description><identifier>ISSN: 1617-4909</identifier><identifier>EISSN: 1617-4917</identifier><identifier>DOI: 10.1007/s00779-008-0212-5</identifier><language>eng</language><publisher>London: Springer-Verlag</publisher><subject>Algorithms ; Computer Science ; Cybersecurity ; Geometry ; Location based services ; Mobile Computing ; Original Article ; Personal Computing ; Privacy ; User Interfaces and Human Computer Interaction</subject><ispartof>Personal and ubiquitous computing, 2009-08, Vol.13 (6), p.391-399</ispartof><rights>Springer-Verlag London Limited 2008</rights><rights>Springer-Verlag London Limited 2009</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c346t-4b92d41a13a3b70aa1a1ce157ae106243c857380127bae894deab5192c29526d3</citedby><cites>FETCH-LOGICAL-c346t-4b92d41a13a3b70aa1a1ce157ae106243c857380127bae894deab5192c29526d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s00779-008-0212-5$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s00779-008-0212-5$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Krumm, John</creatorcontrib><title>A survey of computational location privacy</title><title>Personal and ubiquitous computing</title><addtitle>Pers Ubiquit Comput</addtitle><description>This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples’ attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.</description><subject>Algorithms</subject><subject>Computer Science</subject><subject>Cybersecurity</subject><subject>Geometry</subject><subject>Location based services</subject><subject>Mobile Computing</subject><subject>Original Article</subject><subject>Personal Computing</subject><subject>Privacy</subject><subject>User Interfaces and Human Computer Interaction</subject><issn>1617-4909</issn><issn>1617-4917</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kE9LAzEQxYMoWKsfwNviwYMQnUmym82xFP9BwYuew2yaSsu2qcluod_e1BUFwcvMO_zeMO8xdolwiwD6LuWhDQeoOQgUvDxiI6xQc2VQH_9oMKfsLKUVAOpKVSN2MylSH3d-X4RF4cJ623fULcOG2qIN7ksW27jckdufs5MFtclffO8xe3u4f50-8dnL4_N0MuNOqqrjqjFirpBQkmw0EGXpPJaaPEIllHR1qWUNKHRDvjZq7qkp0QgnTCmquRyz6-HuNoaP3qfOrpfJ-baljQ99slIZUYMSGbz6A65CH_PryQqoTU4sMUM4QC6GlKJf2BxnTXFvEeyhOjtUZ3N19lCdLbNHDJ6U2c27j7-H_zd9AvYNbwo</recordid><startdate>20090801</startdate><enddate>20090801</enddate><creator>Krumm, John</creator><general>Springer-Verlag</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20090801</creationdate><title>A survey of computational location privacy</title><author>Krumm, John</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c346t-4b92d41a13a3b70aa1a1ce157ae106243c857380127bae894deab5192c29526d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Algorithms</topic><topic>Computer Science</topic><topic>Cybersecurity</topic><topic>Geometry</topic><topic>Location based services</topic><topic>Mobile Computing</topic><topic>Original Article</topic><topic>Personal Computing</topic><topic>Privacy</topic><topic>User Interfaces and Human Computer Interaction</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Krumm, John</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Personal and ubiquitous computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Krumm, John</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A survey of computational location privacy</atitle><jtitle>Personal and ubiquitous computing</jtitle><stitle>Pers Ubiquit Comput</stitle><date>2009-08-01</date><risdate>2009</risdate><volume>13</volume><issue>6</issue><spage>391</spage><epage>399</epage><pages>391-399</pages><issn>1617-4909</issn><eissn>1617-4917</eissn><abstract>This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples’ attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.</abstract><cop>London</cop><pub>Springer-Verlag</pub><doi>10.1007/s00779-008-0212-5</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1617-4909 |
ispartof | Personal and ubiquitous computing, 2009-08, Vol.13 (6), p.391-399 |
issn | 1617-4909 1617-4917 |
language | eng |
recordid | cdi_proquest_miscellaneous_34928042 |
source | Alma/SFX Local Collection; SpringerLink Journals - AutoHoldings |
subjects | Algorithms Computer Science Cybersecurity Geometry Location based services Mobile Computing Original Article Personal Computing Privacy User Interfaces and Human Computer Interaction |
title | A survey of computational location privacy |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T19%3A43%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20survey%20of%20computational%20location%20privacy&rft.jtitle=Personal%20and%20ubiquitous%20computing&rft.au=Krumm,%20John&rft.date=2009-08-01&rft.volume=13&rft.issue=6&rft.spage=391&rft.epage=399&rft.pages=391-399&rft.issn=1617-4909&rft.eissn=1617-4917&rft_id=info:doi/10.1007/s00779-008-0212-5&rft_dat=%3Cproquest_cross%3E1775681871%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=208961731&rft_id=info:pmid/&rfr_iscdi=true |