Privacy-Preserving Indoor Localisation and Navigation

被引:0
|
作者
Konstantinidis, Andreas [1 ]
Chatzimilioudis, Georgios [1 ]
Zeinalipour-Yazti, Demetrios [1 ]
机构
[1] Univ Cyprus, CY-1678 Nicosia, Cyprus
来源
ERCIM NEWS | 2016年 / 106期
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Internet-based Indoor Navigation (IIN) services have recently received considerable attention, mainly because GPS technology is unavailable in indoor spaces and consumes considerable energy. On the other hand, predominant Smartphone OS localisation subsystems currently rely on server-side localisation processes, allowing the service provider to know the location of a user at all times. We have devised an innovative algorithm for protecting users from location tracking by the localisation service, without hindering the provision of fine-grained location updates on a continuous basis. Our proposed Temporal Vector Map (TVM) algorithm allows a user to accurately localise by exploiting a k-Anonymity Bloom (kAB) filter and a bestNeighbors generator of camouflaged localisation requests, both of which are shown to be resilient to a variety of privacy attacks.
引用
收藏
页码:25 / +
页数:2
相关论文
共 50 条
  • [41] Privacy-preserving distributed clustering
    Erkin, Zekeriya
    Veugen, Thijs
    Toft, Tomas
    Lagendijk, Reginald L.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2013, (01):
  • [42] Privacy-preserving webshopping with attributes
    Hampiholi, Brinda
    Alpar, Gergely
    2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 25 - 36
  • [43] Privacy-preserving linear programming
    O. L. Mangasarian
    Optimization Letters, 2011, 5 : 165 - 172
  • [44] PrivatePool: Privacy-Preserving Ridesharing
    Hallgren, Per
    Orlandi, Claudio
    Sabelfeld, Andrei
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 276 - 291
  • [45] Privacy-Preserving Remote Diagnostics
    Brickell, Justin
    Porter, Donald E.
    Shmatikov, Vitaly
    Witchel, Emmett
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 498 - 507
  • [46] Privacy-preserving set union
    Frikken, Keith
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 237 - 252
  • [47] Privacy-Preserving Correlation Coefficient
    Mimoto, Tomoaki
    Yokoyama, Hiroyuki
    Nakamura, Toru
    Isohara, Takamasa
    Hashimoto, Masayuki
    Kojima, Ryosuke
    Hasegawa, Aki
    Okuno, Yasushi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (05) : 868 - 876
  • [48] PRIVACY-PRESERVING ACTION RECOGNITION
    Zou, Chengming
    Yuan, Ducheng
    Lan, Long
    Chi, Haoang
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 2175 - 2179
  • [49] Privacy-preserving trust negotiations
    Bertino, E
    Ferrari, E
    Squicciarini, AC
    PRIVACY ENHANCING TECHNOLOGIES, 2005, 3424 : 283 - 301
  • [50] Privacy-Preserving Implicit Authentication
    Safa, Nashad Ahmed
    Safavi-Naini, Reihaneh
    Shahandashti, Siamak F.
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 471 - 484