Location Privacy Leakage through Sensory Data

被引:38
|
作者
Liang, Yi [1 ]
Cai, Zhipeng [1 ]
Han, Qilong [2 ]
Li, Yingshu [1 ]
机构
[1] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
[2] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin 150001, Heilongjiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Location;
D O I
10.1155/2017/7576307
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices bring benefits as well as the risk of exposing users' location information, as some embedded sensors can be accessed without users' permission and awareness. In this paper, we show that, only by using the data collected from the embedded sensors in mobile devices instead of GPS data, we can infer a user's location information with high accuracy. Three issues are addressed which are route identification, user localization in a specific route, and user localization in a bounded area. The Dynamic Time Warping based technique is designed and we develop a Hidden Markov Model to solve the localization problem. Real experiments are performed to evaluate our proposed methods.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Privacy Through Data Recolouring
    D'Acquisto, Giuseppe
    Mazzoccoli, Alessandro
    Ciminelli, Fabio
    Naldi, Maurizio
    PRIVACY TECHNOLOGIES AND POLICY, APF 2020, 2020, 12121 : 61 - 72
  • [32] A Spectrum Sharing Incentive Scheme Against Location Privacy Leakage in IoT Networks
    Feng J.
    Yang J.
    Zhang R.
    Zhang W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2209 - 2220
  • [33] Location Privacy Preservation Mechanism for Location-Based Service With Incomplete Location Data
    Yang, Xudong
    Gao, Ling
    Zheng, Jie
    Wei, Wei
    IEEE ACCESS, 2020, 8 (08): : 95843 - 95854
  • [34] Protecting Location Privacy Through Random Anonymity Techniques
    Yang, Song-Tao
    Zhang, Zong-Li
    Wang, Bin
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 947 - 952
  • [35] Hiding Stars with Fireworks: Location Privacy through Camouflage
    Meyerowitz, Joseph
    Choudhury, Romit Roy
    FIFTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM 2009), 2009, : 345 - 356
  • [36] Privacy through Uncertainty in Location-Based Services
    Merrill, Shawn
    Basalp, Nilguen
    Biskup, Joachim
    Buchmann, Erik
    Clifton, Chris
    Kuijpers, Bart
    Othman, Walied
    Savas, Erkay
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, : 67 - 72
  • [37] WLAN location sharing through a privacy observant architecture
    Muthukrishnan, Kavitha
    Meratnia, Nirvana
    Lijding, Maria
    Koprinkov, Georgi
    Havinga, Paul
    2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, : 261 - +
  • [38] Hiding in the Mobile Crowd: Location Privacy through Collaboration
    Shokri, Reza
    Theodorakopoulos, George
    Papadimitratos, Panos
    Kazemi, Ehsan
    Hubaux, Jean-Pierre
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (03) : 266 - 279
  • [39] A Data Leakage Traceability Scheme Based on Differential Privacy and Fingerprint
    Wang, Mingyong
    Zheng, Shuli
    2024 3RD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND MEDIA COMPUTING, ICIPMC 2024, 2024, : 327 - 334
  • [40] Quantifying Temporal Privacy Leakage in Continuous Event Data Publishing
    Rafiei, Majid
    Elkoumy, Gamal
    Van der Aalst, Wil M. P.
    COOPERATIVE INFORMATION SYSTEMS (COOPIS 2022), 2022, 13591 : 75 - 94