Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Location cloaking). Showing records 1 – 3 of 3 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Iowa State University

1. Xu, Ge. Location cloaking for location privacy protection and location safety protection.

Degree: 2010, Iowa State University

Many applications today rely on location information, yet disclosing such information can present heightened privacy and safety risks. A person's whereabouts, for example, may reveal sensitive private information such as health condition and lifestyle. Location information also has the potential to allow an adversary to physically locate and destroy a subject, which is particularly concerned in digital battlefields. This research investigates two problems. The first one is location privacy protection in location-based services. Our goal is to provide a desired level of guarantee that the location data collected by the service providers cannot be correlated with restricted spaces such as home and office to derive who's where at what time. We propose 1) leveraging historical location samples for location depersonalization and 2) allowing a user to express her location privacy requirement by identifying a spatial region. With these two ideas in place, we develop a suite of techniques for location-privacy aware uses of location-based services, which can be either sporadic or continuous. An experimental system has been implemented with these techniques. The second problem investigated in this research is location safety protection in ad hoc networks. Unlike location privacy intrusion, the adversary here is not interested in finding the individual identities of the nodes in a spatial region, but simply wants to locate and destroy them. We define the safety level of a spatial region as the inverse of its node density and develop a suite of techniques for location safety-aware cloaking and routing. These schemes allow nodes to disclose their location as accurately as possible, while preventing such information from being used to identify any region with a safety level lower than a required threshold. The performance of the proposed techniques is evaluated through analysis and simulation.

Subjects/Keywords: Location-based routing; Location-based service; Location cloaking; Location privacy; Location safety; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xu, G. (2010). Location cloaking for location privacy protection and location safety protection. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/11628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Xu, Ge. “Location cloaking for location privacy protection and location safety protection.” 2010. Thesis, Iowa State University. Accessed December 12, 2019. https://lib.dr.iastate.edu/etd/11628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Xu, Ge. “Location cloaking for location privacy protection and location safety protection.” 2010. Web. 12 Dec 2019.

Vancouver:

Xu G. Location cloaking for location privacy protection and location safety protection. [Internet] [Thesis]. Iowa State University; 2010. [cited 2019 Dec 12]. Available from: https://lib.dr.iastate.edu/etd/11628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Xu G. Location cloaking for location privacy protection and location safety protection. [Thesis]. Iowa State University; 2010. Available from: https://lib.dr.iastate.edu/etd/11628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Southern California

2. Khoshgozran, Jaffar. Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers.

Degree: PhD, Computer Science, 2010, University of Southern California

An obvious requirement for evaluating spatial queries in Location Based Services (LBS) is that the location of the query point needs to be shared with the location server responding to user queries. Spatial data such as points of interest are indexed at this potentially untrusted server (host) and queries are evaluated by navigating the underlying index structure used to partition the data. However, a user’s location is highly sensitive information that once compromised, can expose him to various threats such as stalking and inference about his health problems or political/religious affiliations. Such growing concerns about users’ location privacy in LBS is considered to be the biggest impediment to the explosive growth and popularity of location-based services. The anonymity and cloaking-based approaches proposed to address this problem cannot provide stringent privacy guarantees without incurring costly computation and communication overhead. Furthermore, they require a trusted intermediate anonymizer to protect user locations during query processing.; In this dissertation, we identify the key challenges of enabling privacy in location-based services using an untrusted server model. We propose three solutions to the location privacy problem. Our first solution employs a space transformation scheme to privately evaluate location queries in a space unknown to the untrusted server. The novel one-way transformation developed allows fast computation of location queries in the transformed space while respecting user privacy. We develop our second solution based on the theory of Private Information Retrieval to achieve yet stronger levels of privacy. This strong measure of privacy comes with more computational cost. Finally, we propose a more fundamental technique that enables oblivious traversal of tree-structured spatial indexes for query processing. With this technique, the original spatial index is replaced with an encrypted spatial index that is hosted at the server. While preserving user privacy, this technique allows a wide range of spatial queries to be efficiently evaluated over the encrypted index. Advisors/Committee Members: Shahabi, Cyrus (Committee Chair), Hashemi, Hossein (Committee Member), Nakano, Aiichiro (Committee Member).

Subjects/Keywords: privacy; location-based services; anonymity; spatial databases; geospatial information management; anonymity; cloaking; anonymizers; social networking; encryption; security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khoshgozran, J. (2010). Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers. (Doctoral Dissertation). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/383951/rec/5226

Chicago Manual of Style (16th Edition):

Khoshgozran, Jaffar. “Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers.” 2010. Doctoral Dissertation, University of Southern California. Accessed December 12, 2019. http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/383951/rec/5226.

MLA Handbook (7th Edition):

Khoshgozran, Jaffar. “Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers.” 2010. Web. 12 Dec 2019.

Vancouver:

Khoshgozran J. Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers. [Internet] [Doctoral dissertation]. University of Southern California; 2010. [cited 2019 Dec 12]. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/383951/rec/5226.

Council of Science Editors:

Khoshgozran J. Privacy in location-based applications: going beyond K-anonymity, cloaking and anonymizers. [Doctoral Dissertation]. University of Southern California; 2010. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll127/id/383951/rec/5226

3. Αγγελής, Αγγελής. Εντοπισμός πηγών ενεργειακών σωματιδίων ηλεκτρομαγνητικών και ακουστικών κυμάτων με πολλαπλούς αισθητήρες.

Degree: 2011, Democritus University of Thrace (DUTH); Δημοκρίτειο Πανεπιστήμιο Θράκης (ΔΠΘ)

Techniques used to hide the location of an object, is the mirror image of techniques used to discover the location of an object. The aim of this thesis is to study location privacy issues concerning the standard, for bidirectional satellite communications, called DVB-RCS. Offering Location based Privacy is a challenge, as the location of the satellite terminals must be revealed to the operator of the DVB-RCS network for technical and administrative reasons. DVB-RCS synchronization scheme on the Return Channel requires the Satellite Terminals to be programmed with their location coordinates with an accuracy of no more than a few kilometers. Terminals use this location information in their ranging calculation to the servicing satellite. For certain users of the system this leak of Location Information can be seen as a serious security event that can lead even to a physical attack. In this thesis two prototype methods were developed to overcome this strict requirement for location accuracy of the DVB-RCS standard. These methods are based on geometric symmetries of the system and on timing tolerances accepted by the standard in the Return Link Synchronization scheme. The use of the above method allows the user to insert false coordinates during the configuration procedure of the satellite modem, thus hiding the true location of the terminal from the Hub, without loss of synchronization or degradation in QOS. Finally the above methods were tested successfully on the real DVB-RCS network of Hellenic Aerospace Industry (HAI).

Ο προσδιορισμός της θέσης ενός αντικειμένου καθώς και η προσπάθεια απόκρυψης της θέσης ενός αντικειμένου αποτελούν από τεχνολογικής άποψης τις δύο όψεις του ίδιου νομίσματος. Στην παρούσα Διδακτορική Διατριβή ασχολούμαστε με τη μελέτη προβλημάτων ιδιωτικότητας, στο πρότυπο αμφιδρόμων δορυφορικών επικοινωνιών DVB-RCS. Το να προφυλαχθεί το απόρρητο θέσης ενός δορυφορικού τερματικού σε ένα δίκτυο DVB-RCS αποτελεί πρόκληση μιας και η θέση εγκατάστασης του πρέπει να αποκαλύπτεται στο διαχειριστή του δικτύου για τεχνικούς λόγους. Πιο συγκεκριμένα το πρότυπο DVB-RCS απαιτεί για λόγους συγχρονισμού του ανάστροφου καναλιού, τα τερματικά να προγραμματίζονται με τις συντεταγμένες του σημείου εγκατάστασης με ακρίβεια της τάξης των μερικών χιλιομέτρων. Τα τερματικά χρησιμοποιούν αυτή την πληροφορία για τον υπολογισμό της απόστασης από τον δορυφόρο που παρέχει την υπηρεσία. Για κάποιους χρήστες του συστήματος αυτή η διαρροή πληροφορίας θέσης αποτελεί σημαντικό συμβάν ασφαλείας που μπορεί να οδηγήσει ακόμα και σε φυσική επίθεση. Στα πλαίσια της παρούσης Διδακτορικής Διατριβής αναπτύχθηκαν δύο πρωτότυπες μέθοδοι, οι οποίες στηριζόμενες σε γεωμετρικές συμμετρίες του συστήματος και σε ανοχές που αποδέχεται το πρότυπο DVB-RCS στο χρονισμό του ανάστροφου καναλιού, επιτρέπουν τη χρήση ψευδών συντεταγμένων στη ρύθμιση του τερματικού, αποκρύπτοντας με αυτό τον τρόπο την πραγματική του θέση, χωρίς αυτό να χάνει το συγχρονισμό του με το Hub ή να μειώνεται η ποιότητα των παρεχόμενων υπηρεσιών. Τέλος οι παραπάνω μέθοδοι…

Subjects/Keywords: Ασφάλεια DVB-RCS; Ιδιωτικότητα - Απόρρητο θέσης; Δορυφορικές επικοινωνίες; Απόκρυψη δεδομένων; Χωρική ακρίβεια; Ανοχές χρονισμού; DVB-RCS security; Location privacy; Satellite communications; Data cloaking; Spatial accuracy; Timing tolerances

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Αγγελής, . . (2011). Εντοπισμός πηγών ενεργειακών σωματιδίων ηλεκτρομαγνητικών και ακουστικών κυμάτων με πολλαπλούς αισθητήρες. (Thesis). Democritus University of Thrace (DUTH); Δημοκρίτειο Πανεπιστήμιο Θράκης (ΔΠΘ). Retrieved from http://hdl.handle.net/10442/hedi/28374

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Αγγελής, Αγγελής. “Εντοπισμός πηγών ενεργειακών σωματιδίων ηλεκτρομαγνητικών και ακουστικών κυμάτων με πολλαπλούς αισθητήρες.” 2011. Thesis, Democritus University of Thrace (DUTH); Δημοκρίτειο Πανεπιστήμιο Θράκης (ΔΠΘ). Accessed December 12, 2019. http://hdl.handle.net/10442/hedi/28374.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Αγγελής, Αγγελής. “Εντοπισμός πηγών ενεργειακών σωματιδίων ηλεκτρομαγνητικών και ακουστικών κυμάτων με πολλαπλούς αισθητήρες.” 2011. Web. 12 Dec 2019.

Vancouver:

Αγγελής . Εντοπισμός πηγών ενεργειακών σωματιδίων ηλεκτρομαγνητικών και ακουστικών κυμάτων με πολλαπλούς αισθητήρες. [Internet] [Thesis]. Democritus University of Thrace (DUTH); Δημοκρίτειο Πανεπιστήμιο Θράκης (ΔΠΘ); 2011. [cited 2019 Dec 12]. Available from: http://hdl.handle.net/10442/hedi/28374.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Αγγελής . Εντοπισμός πηγών ενεργειακών σωματιδίων ηλεκτρομαγνητικών και ακουστικών κυμάτων με πολλαπλούς αισθητήρες. [Thesis]. Democritus University of Thrace (DUTH); Δημοκρίτειο Πανεπιστήμιο Θράκης (ΔΠΘ); 2011. Available from: http://hdl.handle.net/10442/hedi/28374

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.