Coverart for item
The Resource Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang

Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang

Label
Location privacy in mobile applications
Title
Location privacy in mobile applications
Statement of responsibility
Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
Creator
Contributor
Author
Subject
Language
eng
Summary
This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field
Member of
Cataloging source
N$T
http://library.link/vocab/creatorName
Liu, Bo
Dewey number
005.35
Index
no index present
LC call number
QA76.59
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Zhou, Wanlei
  • Zhu, Tianqing
  • Xiang, Yong
  • Wang, Kun
Series statement
SpringerBriefs on cyber security systems and networks
http://library.link/vocab/subjectName
  • Mobile apps
  • Location-based services
Label
Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Contents; Acronyms; 1 Introduction; 1.1 Background; 1.2 Definition of Location Privacy; 1.2.1 Location-Based Services; 1.2.2 Representation of Location Information; 1.2.3 The Definition of Location Privacy; 1.2.4 Location Privacy Versus Data Privacy; 1.3 Location Attacks and Adversaries; 1.3.1 Location Information Obtaining Methods; 1.3.2 Types of Adversarial Knowledge; 1.3.3 Attack Targets; 1.3.4 Types of Attack Methods; 1.3.5 Emerging Trends; 1.4 People's View About Location Privacy
  • 1.4.1 Do People Really Know How Much of Their Location Information Has Been Collected or Revealed?1.4.2 How Do People Care About Their Location Privacy?; 1.5 Location-Based Services in Practical Applications; 1.6 The Unified Location Privacy Research Framework; 1.7 Outline and Book Overview; References; 2 Location Privacy-Preserving Mechanisms; 2.1 Cryptographic Mechanism; 2.2 Anonymization Mechanisms; 2.2.1 k-Anonymity; 2.2.2 Mix-Zone; 2.3 Obfuscation Mechanisms; 2.3.1 Dummy Locations; 2.3.2 Location Obfuscation; 2.3.3 Differential Privacy-Based Methods
  • 2.4 Reducing Location Information Sharing2.4.1 Caching; 2.4.2 Game Theory; 2.5 Comparisons and Discussions; 2.5.1 LPPMs Versus Other Privacy Preservation Techniques; 2.5.2 Comparisons of the Four Different Groups; 2.6 Performance Evaluation: Location Privacy Metrics; 2.6.1 Certainty; 2.6.2 Correctness; 2.6.3 Information Gain or Loss; 2.6.4 Geo-Indistinguishability; 2.6.5 Time; 2.6.6 Discussion on Performance Metrics; References; 3 Location Privacy in Mobile Social Network Applications; 3.1 Introduction; 3.2 Sensitive Location Prediction by Users Social Network Data
  • 3.2.1 Content-Based Approach3.2.2 Check-In-Based Approach; 3.2.3 Check-In Behavior of Users in Mobile Social Networks; 3.2.4 Home Location Prediction Algorithms; 3.2.5 The Adversary and Attack Models; 3.2.6 Privacy Metrics; 3.3 Protecting Important Locations in Social Networks; 3.3.1 Community-Based Geo-Location Information Sharing Scheme; 3.3.2 Aggregated Check-In Behavior of Users in a Community; 3.3.3 Datasets and Evaluation Setup; 3.3.4 Impact on Spatial Feature of the Check-Ins; 3.3.5 Impact on Home Location Prediction Algorithms; 3.4 Summary; References
  • 4 Location Privacy in Mobile Crowd Sensing Applications4.1 Introduction; 4.2 System Model and Problem Formulation; 4.2.1 The General Mobile Crowd Sensing System; 4.2.2 The Basic Idea of Privacy-Preserving MCS Application Framework; 4.2.3 Location Privacy Metric; 4.2.4 Economic Models for the MCS Application; 4.2.5 Problem Formulation; 4.3 Privacy-Preserving MCS Schemes Based on Economic Models; 4.3.1 The Monopoly Model-Based Scheme (MMBS); 4.3.2 Cournot's Oligopoly Model-Based Scheme (COMBS); 4.3.3 Privacy Analysis of Our Proposed Schemes; 4.4 Performance Evaluation; 4.4.1 Simulation Setup
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9789811317057
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
http://library.link/vocab/ext/overdrive/overdriveId
b733dbd4-de3c-4d35-bfcb-1af8c44c3fb7
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • on1050448392
  • (OCoLC)1050448392
Label
Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Preface; Contents; Acronyms; 1 Introduction; 1.1 Background; 1.2 Definition of Location Privacy; 1.2.1 Location-Based Services; 1.2.2 Representation of Location Information; 1.2.3 The Definition of Location Privacy; 1.2.4 Location Privacy Versus Data Privacy; 1.3 Location Attacks and Adversaries; 1.3.1 Location Information Obtaining Methods; 1.3.2 Types of Adversarial Knowledge; 1.3.3 Attack Targets; 1.3.4 Types of Attack Methods; 1.3.5 Emerging Trends; 1.4 People's View About Location Privacy
  • 1.4.1 Do People Really Know How Much of Their Location Information Has Been Collected or Revealed?1.4.2 How Do People Care About Their Location Privacy?; 1.5 Location-Based Services in Practical Applications; 1.6 The Unified Location Privacy Research Framework; 1.7 Outline and Book Overview; References; 2 Location Privacy-Preserving Mechanisms; 2.1 Cryptographic Mechanism; 2.2 Anonymization Mechanisms; 2.2.1 k-Anonymity; 2.2.2 Mix-Zone; 2.3 Obfuscation Mechanisms; 2.3.1 Dummy Locations; 2.3.2 Location Obfuscation; 2.3.3 Differential Privacy-Based Methods
  • 2.4 Reducing Location Information Sharing2.4.1 Caching; 2.4.2 Game Theory; 2.5 Comparisons and Discussions; 2.5.1 LPPMs Versus Other Privacy Preservation Techniques; 2.5.2 Comparisons of the Four Different Groups; 2.6 Performance Evaluation: Location Privacy Metrics; 2.6.1 Certainty; 2.6.2 Correctness; 2.6.3 Information Gain or Loss; 2.6.4 Geo-Indistinguishability; 2.6.5 Time; 2.6.6 Discussion on Performance Metrics; References; 3 Location Privacy in Mobile Social Network Applications; 3.1 Introduction; 3.2 Sensitive Location Prediction by Users Social Network Data
  • 3.2.1 Content-Based Approach3.2.2 Check-In-Based Approach; 3.2.3 Check-In Behavior of Users in Mobile Social Networks; 3.2.4 Home Location Prediction Algorithms; 3.2.5 The Adversary and Attack Models; 3.2.6 Privacy Metrics; 3.3 Protecting Important Locations in Social Networks; 3.3.1 Community-Based Geo-Location Information Sharing Scheme; 3.3.2 Aggregated Check-In Behavior of Users in a Community; 3.3.3 Datasets and Evaluation Setup; 3.3.4 Impact on Spatial Feature of the Check-Ins; 3.3.5 Impact on Home Location Prediction Algorithms; 3.4 Summary; References
  • 4 Location Privacy in Mobile Crowd Sensing Applications4.1 Introduction; 4.2 System Model and Problem Formulation; 4.2.1 The General Mobile Crowd Sensing System; 4.2.2 The Basic Idea of Privacy-Preserving MCS Application Framework; 4.2.3 Location Privacy Metric; 4.2.4 Economic Models for the MCS Application; 4.2.5 Problem Formulation; 4.3 Privacy-Preserving MCS Schemes Based on Economic Models; 4.3.1 The Monopoly Model-Based Scheme (MMBS); 4.3.2 Cournot's Oligopoly Model-Based Scheme (COMBS); 4.3.3 Privacy Analysis of Our Proposed Schemes; 4.4 Performance Evaluation; 4.4.1 Simulation Setup
Dimensions
unknown
Extent
1 online resource.
File format
unknown
Form of item
online
Isbn
9789811317057
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
http://library.link/vocab/ext/overdrive/overdriveId
b733dbd4-de3c-4d35-bfcb-1af8c44c3fb7
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
  • on1050448392
  • (OCoLC)1050448392

Library Locations

Processing Feedback ...