Please use this identifier to cite or link to this item:
Title: Towards successive privacy protection in sensor networks
Authors: Zhao, B
Wang, D 
Shao, Z 
Cao, J 
Chan, KCC 
Su, J
Yang, Y
Issue Date: 2008
Source: Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008, 2008, v. 2, 4755224, p. 167-172 How to cite?
Abstract: With the emerging embedding of the sensor networks into the pervasive environment, our capabilities on location information gathering and processing have been greatly improved. Although this information is very useful, it also brings great challenges for protecting the privacy. Currently, most research efforts focus on protecting current location, and ignore the internal relationship among the successive locations. To date, there are many techniques to infer a location when the related successive information is published, and which bring in serious privacy and security concerns. In this paper, we for the first time consider this kind of relationship, and identify a novel successive privacy threat. We then formulate a generic model for protecting the successive privacy. Under this model, there is a tradeoff between the number of data to be published and the privacy protecting level, and which brings a novel maximum publishable location privacy problem. As this problem is intractable, we develop several heuristics. Extensive simulations demonstrate the effectiveness of our schemes.
Description: 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008, Shanghai, 17-20 December 2008
ISBN: 9780769534923
DOI: 10.1109/EUC.2008.150
Appears in Collections:Conference Paper

View full-text via PolyU eLinks SFX Query
Show full item record


Last Week
Last month
Citations as of Aug 13, 2018

Page view(s)

Last Week
Last month
Citations as of Aug 14, 2018

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.