Muutke küpsiste eelistusi

E-raamat: Location Privacy in Mobile Applications

  • Formaat - EPUB+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.
1 Introduction
1(16)
1.1 Background
1(1)
1.2 Definition of Location Privacy
2(4)
1.2.1 Location-Based Services
2(1)
1.2.2 Representation of Location Information
3(2)
1.2.3 The Definition of Location Privacy
5(1)
1.2.4 Location Privacy Versus Data Privacy
6(1)
1.3 Location Attacks and Adversaries
6(4)
1.3.1 Location Information Obtaining Methods
7(1)
1.3.2 Types of Adversarial Knowledge
7(1)
1.3.3 Attack Targets
8(1)
1.3.4 Types of Attack Methods
9(1)
1.3.5 Emerging Trends
10(1)
1.4 People's View About Location Privacy
10(1)
1.4.1 Do People Really Know How Much of Their Location Information Has Been Collected or Revealed?
10(1)
1.4.2 How Do People Care About Their Location Privacy?
11(1)
1.5 Location-Based Services in Practical Applications
11(2)
1.6 The Unified Location Privacy Research Framework
13(1)
1.7 Outline and Book Overview
14(3)
References
14(3)
2 Location Privacy-Preserving Mechanisms
17(16)
2.1 Cryptographic Mechanism
17(1)
2.2 Anonymization Mechanisms
18(2)
2.2.1 k-Anonymity
18(1)
2.2.2 Mix-Zone
19(1)
2.3 Obfuscation Mechanisms
20(2)
2.3.1 Dummy Locations
20(1)
2.3.2 Location Obfuscation
20(1)
2.3.3 Differential Privacy-Based Methods
21(1)
2.4 Reducing Location Information Sharing
22(1)
2.4.1 Caching
22(1)
2.4.2 Game Theory
22(1)
2.5 Comparisons and Discussions
22(3)
2.5.1 LPPMs Versus Other Privacy Preservation Techniques
22(2)
2.5.2 Comparisons of the Four Different Groups
24(1)
2.6 Performance Evaluation: Location Privacy Metrics
25(8)
2.6.1 Certainty
25(1)
2.6.2 Correctness
26(1)
2.6.3 Information Gain or Loss
26(1)
2.6.4 Geo-Indistinguishability
27(1)
2.6.5 Time
27(1)
2.6.6 Discussion on Performance Metrics
28(1)
References
28(5)
3 Location Privacy in Mobile Social Network Applications
33(14)
3.1 Introduction
33(1)
3.2 Sensitive Location Prediction by Users Social Network Data
34(3)
3.2.1 Content-Based Approach
34(1)
3.2.2 Check-In-Based Approach
34(1)
3.2.3 Check-In Behavior of Users in Mobile Social Networks
35(1)
3.2.4 Home Location Prediction Algorithms
36(1)
3.2.5 The Adversary and Attack Models
36(1)
3.2.6 Privacy Metrics
37(1)
3.3 Protecting Important Locations in Social Networks
37(5)
3.3.1 Community-Based Geo-Location Information Sharing Scheme
37(2)
3.3.2 Aggregated Check-In Behavior of Users in a Community
39(1)
3.3.3 Datasets and Evaluation Setup
39(1)
3.3.4 Impact on Spatial Feature of the Check-Ins
40(1)
3.3.5 Impact on Home Location Prediction Algorithms
40(2)
3.4 Summary
42(5)
References
45(2)
4 Location Privacy in Mobile Crowd Sensing Applications
47(30)
4.1 Introduction
47(2)
4.2 System Model and Problem Formulation
49(5)
4.2.1 The General Mobile Crowd Sensing System
49(1)
4.2.2 The Basic Idea of Privacy-Preserving MCS Application Framework
49(2)
4.2.3 Location Privacy Metric
51(1)
4.2.4 Economic Models for the MCS Application
51(2)
4.2.5 Problem Formulation
53(1)
4.3 Privacy-Preserving MCS Schemes Based on Economic Models
54(8)
4.3.1 The Monopoly Model-Based Scheme (MMBS)
55(3)
4.3.2 Cournot's Oligopoly Model-Based Scheme (COMBS)
58(2)
4.3.3 Privacy Analysis of Our Proposed Schemes
60(2)
4.4 Performance Evaluation
62(12)
4.4.1 Simulation Setup
62(1)
4.4.2 Performance Analysis
63(9)
4.4.3 Discussions
72(2)
4.5 Conclusions and Future Works
74(3)
References
75(2)
5 Location Privacy in Wireless Vehicular Networks
77(22)
5.1 Introduction
77(2)
5.2 System Model
79(4)
5.2.1 System Model
79(1)
5.2.2 V2R Communication Model
80(2)
5.2.3 Privacy Threats for In-Vehicle Users and Adversary Attack Models
82(1)
5.2.4 POI Query Probability
82(1)
5.3 Problem Formulation and the Proposed Privacy-Enhancing Scheme
83(5)
5.3.1 Basic Idea of Our Privacy Preservation Framework
83(1)
5.3.2 Location Privacy Metrics
84(1)
5.3.3 Problem Formulation
85(1)
5.3.4 Privacy-Enhancing Scheme Based on LBS Content Broadcasting and Active Caching (LBS-CBAC)
86(2)
5.3.5 Knowledge-Based Pre-caching for RSU Broadcasting Content
88(1)
5.4 Performance Evaluation
88(9)
5.4.1 Simulation Setup
88(2)
5.4.2 Performance Analysis
90(5)
5.4.3 Comparison of Privacy Level with k-Anonymity Methods
95(1)
5.4.4 Further Discussions
96(1)
5.5 Conclusions
97(2)
References
97(2)
6 Future Directions and Conclusions
99
6.1 Future Directions
99(1)
6.1.1 Location Privacy Protection Under Correlations
99(1)
6.1.2 Location Privacy in Big Data and Deep Learning Era
99(1)
6.1.3 Location Privacy in Autonomous Systems
100(1)
6.2 Conclusions
100
References
101
Bo Liu received his B.S. degree from Nanjing University of Posts and Telecommunications, China, in 2004 and his M.S. and Ph.D. degrees in 2007 and 2010, respectively, from Shanghai Jiao Tong University, Shanghai, China, all in Electrical Engineering. From 2010 to 2014, he was an Assistant/Associate Research Professor at the Electrical Engineering Department, Shanghai Jiao Tong University. He was a postdoctoral research fellow at Deakin University, Melbourne, Australia, from 2014 to 2017. He is currently a lecturer at the Department of Engineering, La Trobe University, VIC 3086, Australia. His research interests include wireless communications and networking, security, and privacy issues in wireless networks.    Wanlei Zhou received his B.Eng. and M.Eng. degrees from Harbin Institute of Technology, China in 1982 and 1984, respectively, and his Ph.D. degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a D.Sc. degree from Deakin University in 2002. He is currently the Head of School of school of software in University of Technology Sydney, Australia. He was an Alfred Deakin Professor and Chair of Information Technology, School of Information Technology. Professor Zhou has published more than 300 papers in refereed international journals and conference proceedings, and he has chaired numerous international conferences.    Tianqing Zhu received her B.Eng. and M.Eng. degrees from Wuhan University, China, in 2000 and 2004, respectively, and her Ph.D. in Computer Science from Deakin University, Australia, in 2014. Dr. Zhu is currently a senior lecturer in the school of software in University of Technology Sydney, Australia. Before that, she was a lecturer in the School of Information Technology, Deakin University. Her research interests include privacy preservation, data mining and network security.   Yong Xiang received his B.Eng. and M.E. degrees from the University of Electronic Science and Technology of China, Chengdu, China, in 1983 and 1989, respectively. In 2003, he received his Ph.D. degree from The University of Melbourne, Australia. He is currently a Professor at the School of Information Technology at Deakin University, Melbourne, Australia. He is also the Associate Head of School (Research) and Director of the Artificial Intelligence and Data Analytics Research Cluster. His research interests include information security and privacy, multimedia (speech/image/video) processing, wireless sensor networks and IoT, and biomedical signal processing. He has authored over 160 refereed journal and conference papers in these areas.  Kun Wang received his B. Eng. and Ph.D. degrees from the School of Computer Science, Nanjing University of Posts and Telecommunications, China, in 2004 and 2009, respectively. From 2013 to 2015, he was a postdoctoral fellow at the Electrical Engineering Department, University of California, Los Angeles (UCLA), USA. In 2016, he was a research fellow at the School of Computer Science and Engineering, the University of AIZU, Fukushima, Japan. He is currently a research fellow at the Department of Computing, Hong Kong Polytechnic University, China, and also a Full Professor at the School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China. He has published over 100 papers in refereed international conferences and journals. He is a senior member of the IEEE and a member of the ACM. His current research interests are mainly in big data, wireless communications and networking, smart grids, and information security technologies.