KUR-Algorithm: From Position to Trajectory Privacy Protection in Location-Based Applications

Josef Küng, Trong Nhan Phan, Khanh Tran Dang

Research output: Chapter in Book/Report/Conference proceedingConference proceedingspeer-review

Abstract

Some obfuscation techniques may fail to protect user privacy because of the moving context as well as the background knowledge of adversaries. In this paper, we propose a novel scheme to distinctly protect user privacy not only from user position but also from user trajectory. Furthermore, we present kUR-algorithm, which is context-aware and can be employed as either an independent method or a supportive technique, to give the high-level user privacy protection against privacy disclosure and privacy leak. Last but not least, we analyse other potential privacy problems which usually emerge as outliers and show how well our proposed solution overcomes these scenarios.
Original languageEnglish
Title of host publicationDatabase and Expert Systems Applications - 26th International Conference, DEXA 2015, Proceedings
EditorsAbdelkader Hameurlain, Roland Wagner, Hendrik Decker, Farouk Toumani, Qiming Chen
PublisherSpringer
Pages82-89
Number of pages8
Volume9262
ISBN (Print)978-3-319-22851-8
DOIs
Publication statusPublished - 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9262
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Fields of science

  • 202007 Computer integrated manufacturing (CIM)
  • 102 Computer Sciences
  • 102001 Artificial intelligence
  • 102006 Computer supported cooperative work (CSCW)
  • 102010 Database systems
  • 102014 Information design
  • 102015 Information systems
  • 102016 IT security
  • 102022 Software development
  • 102025 Distributed systems
  • 502007 E-commerce
  • 505002 Data protection
  • 506002 E-government
  • 509018 Knowledge management

JKU Focus areas

  • Computation in Informatics and Mathematics

Cite this