To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Location obfuscation

From Wikipedia, the free encyclopedia

Location obfuscation is a technique used in location-based services or information systems to protect the location of the users by slightly altering, substituting or generalizing their location in order to avoid reflecting their real position.

A formal definition of location obfuscation can be "the means of deliberately degrading the quality of information about an individual's location in order to protect that individual's location privacy.[1]

YouTube Encyclopedic

  • 1/1
    Views:
    500
  • The Book My Project | ANONYMOUS QUERY PROCESSING IN ROAD NETWORKS

Transcription

Obfuscation techniques

The most common techniques to perform this change are:

  • Pseudonyms and the use of third party location providers[2]
  • "Spatial cloaking" techniques in which a user is k-anonymous if her exact location cannot be distinguished among k-1 other users [3]
  • "Invisible cloaking", in which no locations are provided for certain zones
  • Adding random noise to the position [4]
  • Rounding, which uses landmarks to approximate the location [5]
  • Redefinition of possible areas of location.[6]

Each technique for obfuscating location has strengths and weaknesses, and it is important to assess them based on each use case. For example, adding random noise is simple to implement, but can inadvertently create a circle of obfuscated values where the center reveals the individual's exact location. One should also consider the level of obfuscation required in urban areas versus rural areas.

References

  1. ^ M. Duckham, L. Kulik and A. Birtley, "A Formal Model of Obfuscation and Negotiation for Location Privacy." In Proc. Pervasive 2005. LCNC 3468/2005, pp. 243–251, 2005
  2. ^ T. Rodden, A. Friday, H. Muller, and A. Dix, "A Lightweight Approach to Managing Privacy in Location-Based Services". Technical Report. Equator-02-058. CSTR-07-006, University of Nottingham and Lancaster University and University of Bristol. October 2002.
  3. ^ M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking". In Proc. MobiSys ’03, pp. 31–42, 2003.
  4. ^ M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, "Geo-indistinguishability: differential privacy for location-based systems". In Proc. of CCS 2013, ACM, pp. 901–914, 2013.
  5. ^ Krumm, J, “Inference Attacks on Location Tracks”. In Proc. Pervasive 2007, Springer-Verlag, pp. 127–143.
  6. ^ Ardagna, Claudio; Cremonini, Marco; De Capitani di Vimercati, Sabrina; Samarati, Pierangela (1 January 2011). "An Obfuscation-Based Approach for Protecting Location Privacy". IEEE Transactions on Dependable and Secure Computing. 8 (1): 13–27. CiteSeerX 10.1.1.182.9007. doi:10.1109/TDSC.2009.25. S2CID 105178.
This page was last edited on 13 January 2024, at 09:26
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.