{"title":"A System for Managing Vehicle Location Data with Optimal Privacy Features","authors":"F. Buccafurri, G. Lax","doi":"10.1109/ICSNC.2010.25","DOIUrl":null,"url":null,"abstract":"The high amount of vehicle location data, which come from various sources, raises serious privacy concerns. In this paper, we describe a system to store location data in such a way that privacy can be enforced according to standard requirements. The system maximizes the precision of location data in order that they can be profitable exploited for positive purposes, like crime fighting. The core of the system is the strategy used to reach this goal that combines the approaches of k-anonymity and location obfuscation to preserve privacy and uses a dynamic-programming technique to find the solution compliant with the privacy requirements and having the best accuracy.","PeriodicalId":152012,"journal":{"name":"2010 Fifth International Conference on Systems and Networks Communications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Fifth International Conference on Systems and Networks Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSNC.2010.25","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The high amount of vehicle location data, which come from various sources, raises serious privacy concerns. In this paper, we describe a system to store location data in such a way that privacy can be enforced according to standard requirements. The system maximizes the precision of location data in order that they can be profitable exploited for positive purposes, like crime fighting. The core of the system is the strategy used to reach this goal that combines the approaches of k-anonymity and location obfuscation to preserve privacy and uses a dynamic-programming technique to find the solution compliant with the privacy requirements and having the best accuracy.