The Resource Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
Resource Information
The item Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Sydney Jones Library, University of Liverpool.This item is available to borrow from 1 library branch.
Resource Information
The item Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Sydney Jones Library, University of Liverpool.
This item is available to borrow from 1 library branch.
- Summary
- This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field
- Language
- eng
- Extent
- 1 online resource.
- Contents
-
- Intro; Preface; Contents; Acronyms; 1 Introduction; 1.1 Background; 1.2 Definition of Location Privacy; 1.2.1 Location-Based Services; 1.2.2 Representation of Location Information; 1.2.3 The Definition of Location Privacy; 1.2.4 Location Privacy Versus Data Privacy; 1.3 Location Attacks and Adversaries; 1.3.1 Location Information Obtaining Methods; 1.3.2 Types of Adversarial Knowledge; 1.3.3 Attack Targets; 1.3.4 Types of Attack Methods; 1.3.5 Emerging Trends; 1.4 People's View About Location Privacy
- 1.4.1 Do People Really Know How Much of Their Location Information Has Been Collected or Revealed?1.4.2 How Do People Care About Their Location Privacy?; 1.5 Location-Based Services in Practical Applications; 1.6 The Unified Location Privacy Research Framework; 1.7 Outline and Book Overview; References; 2 Location Privacy-Preserving Mechanisms; 2.1 Cryptographic Mechanism; 2.2 Anonymization Mechanisms; 2.2.1 k-Anonymity; 2.2.2 Mix-Zone; 2.3 Obfuscation Mechanisms; 2.3.1 Dummy Locations; 2.3.2 Location Obfuscation; 2.3.3 Differential Privacy-Based Methods
- 2.4 Reducing Location Information Sharing2.4.1 Caching; 2.4.2 Game Theory; 2.5 Comparisons and Discussions; 2.5.1 LPPMs Versus Other Privacy Preservation Techniques; 2.5.2 Comparisons of the Four Different Groups; 2.6 Performance Evaluation: Location Privacy Metrics; 2.6.1 Certainty; 2.6.2 Correctness; 2.6.3 Information Gain or Loss; 2.6.4 Geo-Indistinguishability; 2.6.5 Time; 2.6.6 Discussion on Performance Metrics; References; 3 Location Privacy in Mobile Social Network Applications; 3.1 Introduction; 3.2 Sensitive Location Prediction by Users Social Network Data
- 3.2.1 Content-Based Approach3.2.2 Check-In-Based Approach; 3.2.3 Check-In Behavior of Users in Mobile Social Networks; 3.2.4 Home Location Prediction Algorithms; 3.2.5 The Adversary and Attack Models; 3.2.6 Privacy Metrics; 3.3 Protecting Important Locations in Social Networks; 3.3.1 Community-Based Geo-Location Information Sharing Scheme; 3.3.2 Aggregated Check-In Behavior of Users in a Community; 3.3.3 Datasets and Evaluation Setup; 3.3.4 Impact on Spatial Feature of the Check-Ins; 3.3.5 Impact on Home Location Prediction Algorithms; 3.4 Summary; References
- 4 Location Privacy in Mobile Crowd Sensing Applications4.1 Introduction; 4.2 System Model and Problem Formulation; 4.2.1 The General Mobile Crowd Sensing System; 4.2.2 The Basic Idea of Privacy-Preserving MCS Application Framework; 4.2.3 Location Privacy Metric; 4.2.4 Economic Models for the MCS Application; 4.2.5 Problem Formulation; 4.3 Privacy-Preserving MCS Schemes Based on Economic Models; 4.3.1 The Monopoly Model-Based Scheme (MMBS); 4.3.2 Cournot's Oligopoly Model-Based Scheme (COMBS); 4.3.3 Privacy Analysis of Our Proposed Schemes; 4.4 Performance Evaluation; 4.4.1 Simulation Setup
- Isbn
- 9789811317057
- Label
- Location privacy in mobile applications
- Title
- Location privacy in mobile applications
- Statement of responsibility
- Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
- Language
- eng
- Summary
- This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field
- Cataloging source
- N$T
- http://library.link/vocab/creatorName
- Liu, Bo
- Dewey number
- 005.35
- Index
- no index present
- LC call number
- QA76.59
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Zhou, Wanlei
- Zhu, Tianqing
- Xiang, Yong
- Wang, Kun
- Series statement
- SpringerBriefs on cyber security systems and networks
- http://library.link/vocab/subjectName
-
- Mobile apps
- Location-based services
- Label
- Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Preface; Contents; Acronyms; 1 Introduction; 1.1 Background; 1.2 Definition of Location Privacy; 1.2.1 Location-Based Services; 1.2.2 Representation of Location Information; 1.2.3 The Definition of Location Privacy; 1.2.4 Location Privacy Versus Data Privacy; 1.3 Location Attacks and Adversaries; 1.3.1 Location Information Obtaining Methods; 1.3.2 Types of Adversarial Knowledge; 1.3.3 Attack Targets; 1.3.4 Types of Attack Methods; 1.3.5 Emerging Trends; 1.4 People's View About Location Privacy
- 1.4.1 Do People Really Know How Much of Their Location Information Has Been Collected or Revealed?1.4.2 How Do People Care About Their Location Privacy?; 1.5 Location-Based Services in Practical Applications; 1.6 The Unified Location Privacy Research Framework; 1.7 Outline and Book Overview; References; 2 Location Privacy-Preserving Mechanisms; 2.1 Cryptographic Mechanism; 2.2 Anonymization Mechanisms; 2.2.1 k-Anonymity; 2.2.2 Mix-Zone; 2.3 Obfuscation Mechanisms; 2.3.1 Dummy Locations; 2.3.2 Location Obfuscation; 2.3.3 Differential Privacy-Based Methods
- 2.4 Reducing Location Information Sharing2.4.1 Caching; 2.4.2 Game Theory; 2.5 Comparisons and Discussions; 2.5.1 LPPMs Versus Other Privacy Preservation Techniques; 2.5.2 Comparisons of the Four Different Groups; 2.6 Performance Evaluation: Location Privacy Metrics; 2.6.1 Certainty; 2.6.2 Correctness; 2.6.3 Information Gain or Loss; 2.6.4 Geo-Indistinguishability; 2.6.5 Time; 2.6.6 Discussion on Performance Metrics; References; 3 Location Privacy in Mobile Social Network Applications; 3.1 Introduction; 3.2 Sensitive Location Prediction by Users Social Network Data
- 3.2.1 Content-Based Approach3.2.2 Check-In-Based Approach; 3.2.3 Check-In Behavior of Users in Mobile Social Networks; 3.2.4 Home Location Prediction Algorithms; 3.2.5 The Adversary and Attack Models; 3.2.6 Privacy Metrics; 3.3 Protecting Important Locations in Social Networks; 3.3.1 Community-Based Geo-Location Information Sharing Scheme; 3.3.2 Aggregated Check-In Behavior of Users in a Community; 3.3.3 Datasets and Evaluation Setup; 3.3.4 Impact on Spatial Feature of the Check-Ins; 3.3.5 Impact on Home Location Prediction Algorithms; 3.4 Summary; References
- 4 Location Privacy in Mobile Crowd Sensing Applications4.1 Introduction; 4.2 System Model and Problem Formulation; 4.2.1 The General Mobile Crowd Sensing System; 4.2.2 The Basic Idea of Privacy-Preserving MCS Application Framework; 4.2.3 Location Privacy Metric; 4.2.4 Economic Models for the MCS Application; 4.2.5 Problem Formulation; 4.3 Privacy-Preserving MCS Schemes Based on Economic Models; 4.3.1 The Monopoly Model-Based Scheme (MMBS); 4.3.2 Cournot's Oligopoly Model-Based Scheme (COMBS); 4.3.3 Privacy Analysis of Our Proposed Schemes; 4.4 Performance Evaluation; 4.4.1 Simulation Setup
- Dimensions
- unknown
- Extent
- 1 online resource.
- File format
- unknown
- Form of item
- online
- Isbn
- 9789811317057
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- http://library.link/vocab/ext/overdrive/overdriveId
- b733dbd4-de3c-4d35-bfcb-1af8c44c3fb7
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
-
- on1050448392
- (OCoLC)1050448392
- Label
- Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Preface; Contents; Acronyms; 1 Introduction; 1.1 Background; 1.2 Definition of Location Privacy; 1.2.1 Location-Based Services; 1.2.2 Representation of Location Information; 1.2.3 The Definition of Location Privacy; 1.2.4 Location Privacy Versus Data Privacy; 1.3 Location Attacks and Adversaries; 1.3.1 Location Information Obtaining Methods; 1.3.2 Types of Adversarial Knowledge; 1.3.3 Attack Targets; 1.3.4 Types of Attack Methods; 1.3.5 Emerging Trends; 1.4 People's View About Location Privacy
- 1.4.1 Do People Really Know How Much of Their Location Information Has Been Collected or Revealed?1.4.2 How Do People Care About Their Location Privacy?; 1.5 Location-Based Services in Practical Applications; 1.6 The Unified Location Privacy Research Framework; 1.7 Outline and Book Overview; References; 2 Location Privacy-Preserving Mechanisms; 2.1 Cryptographic Mechanism; 2.2 Anonymization Mechanisms; 2.2.1 k-Anonymity; 2.2.2 Mix-Zone; 2.3 Obfuscation Mechanisms; 2.3.1 Dummy Locations; 2.3.2 Location Obfuscation; 2.3.3 Differential Privacy-Based Methods
- 2.4 Reducing Location Information Sharing2.4.1 Caching; 2.4.2 Game Theory; 2.5 Comparisons and Discussions; 2.5.1 LPPMs Versus Other Privacy Preservation Techniques; 2.5.2 Comparisons of the Four Different Groups; 2.6 Performance Evaluation: Location Privacy Metrics; 2.6.1 Certainty; 2.6.2 Correctness; 2.6.3 Information Gain or Loss; 2.6.4 Geo-Indistinguishability; 2.6.5 Time; 2.6.6 Discussion on Performance Metrics; References; 3 Location Privacy in Mobile Social Network Applications; 3.1 Introduction; 3.2 Sensitive Location Prediction by Users Social Network Data
- 3.2.1 Content-Based Approach3.2.2 Check-In-Based Approach; 3.2.3 Check-In Behavior of Users in Mobile Social Networks; 3.2.4 Home Location Prediction Algorithms; 3.2.5 The Adversary and Attack Models; 3.2.6 Privacy Metrics; 3.3 Protecting Important Locations in Social Networks; 3.3.1 Community-Based Geo-Location Information Sharing Scheme; 3.3.2 Aggregated Check-In Behavior of Users in a Community; 3.3.3 Datasets and Evaluation Setup; 3.3.4 Impact on Spatial Feature of the Check-Ins; 3.3.5 Impact on Home Location Prediction Algorithms; 3.4 Summary; References
- 4 Location Privacy in Mobile Crowd Sensing Applications4.1 Introduction; 4.2 System Model and Problem Formulation; 4.2.1 The General Mobile Crowd Sensing System; 4.2.2 The Basic Idea of Privacy-Preserving MCS Application Framework; 4.2.3 Location Privacy Metric; 4.2.4 Economic Models for the MCS Application; 4.2.5 Problem Formulation; 4.3 Privacy-Preserving MCS Schemes Based on Economic Models; 4.3.1 The Monopoly Model-Based Scheme (MMBS); 4.3.2 Cournot's Oligopoly Model-Based Scheme (COMBS); 4.3.3 Privacy Analysis of Our Proposed Schemes; 4.4 Performance Evaluation; 4.4.1 Simulation Setup
- Dimensions
- unknown
- Extent
- 1 online resource.
- File format
- unknown
- Form of item
- online
- Isbn
- 9789811317057
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- http://library.link/vocab/ext/overdrive/overdriveId
- b733dbd4-de3c-4d35-bfcb-1af8c44c3fb7
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
-
- on1050448392
- (OCoLC)1050448392
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Location-privacy-in-mobile-applications-Bo-Liu/t7ed2izbWYc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Location-privacy-in-mobile-applications-Bo-Liu/t7ed2izbWYc/">Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/Location-privacy-in-mobile-applications-Bo-Liu/t7ed2izbWYc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/Location-privacy-in-mobile-applications-Bo-Liu/t7ed2izbWYc/">Location privacy in mobile applications, Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">Sydney Jones Library, University of Liverpool</a></span></span></span></span></div>