{"title":"A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment","authors":"Heechang Shin, V. Atluri, Jaideep Vaidya","doi":"10.1109/MDM.2008.33","DOIUrl":"https://doi.org/10.1109/MDM.2008.33","url":null,"abstract":"Location based services (LBS) aim at delivering point of need information. Personalization and customization of such services, based on the profiles of mobile users, would significantly increase the value of these services. Since profiles may include sensitive information of mobile users and moreover can help identify a person, customization is allowed only when the security and privacy policies dictated by them are respected. While LBS are often presumed as untrusted entities, the location services that capture and maintain mobile users' location to enable communication are considered trusted, and therefore can capture and manage the profile information. In this paper, we address the problem of privacy preservation via anonymization. Prior research in this area attempts to ensure k-anonymity by generalizing the location. However, a person may still be identified based on his/her profile if the profiles of all k people are not the same. We extend the notion of k-anonymity by proposing a profile based k-anonymization model that guarantees anonymity even when profiles of mobile users are known to untrusted entities. Specifically, our proposed approaches generalize both location and profiles to the extent specified by the user. We support three types of queries - mobile users requesting stationary resources, stationary users requesting mobile resources, and mobile users requesting mobile resources. We propose a novel unified index structure, called the (PTPR- tree), which organizes both the locations of mobile users as well as their profiles using a single index, and as a result, offers significant performance gain during anonymization as well as query processing.","PeriodicalId":365750,"journal":{"name":"The Ninth International Conference on Mobile Data Management (mdm 2008)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120959510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lattice-Based Semantic Location Model for Indoor Navigation","authors":"Dandan Li, Lee","doi":"10.1109/MDM.2008.11","DOIUrl":"https://doi.org/10.1109/MDM.2008.11","url":null,"abstract":"Location models play an important role in location- based services (LBSs), because LBSs require a well-defined representation of location knowledge to support location browsing, navigation and query processing. Current location models can be divided into two categories: symbolic and geometric. Symbolic models try to represent the semantic relationships between entities, and geometric models are based on geometric coordinates and Euclidean distance. In this paper, we propose a lattice-based semantic location model (LSLM) for the indoor environment. LSLM is based on the exit-location model and the theory of \"formal concept analysis.\" The model can provide an explicit representation of the basic relationships between two entities such as containment and overlap. The nearest neighbor relationship on the concept lattice is used to define the optimal distance between two entities. Furthermore, the dual (location/exit) property of the model can cater for different navigation needs. We provide examples to show the effectiveness of our model.","PeriodicalId":365750,"journal":{"name":"The Ninth International Conference on Mobile Data Management (mdm 2008)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125045774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location-Dependent Skyline Query","authors":"Baihua Zheng, Ken C. K. Lee, Wang-Chien Lee","doi":"10.1109/MDM.2008.14","DOIUrl":"https://doi.org/10.1109/MDM.2008.14","url":null,"abstract":"Given a set of data points with both spatial coordinates and non-spatial attributes, point a location-dependently dominates point b with respect to a query point q if a is closer to q than b and meanwhile a dominates b. A location- dependent skyline query (LDSQ) issued at point q is to retrieve all the points that are not location-dependently dominated by other points with regard to q. In this paper, we focus on the query processing and result validation of LDSQ over static objects. Two algorithms, namely brute-forth and delta-scanning, are proposed. The former serves as the baseline algorithm while the latter significantly improves the performance via space pruning. We further conduct a comprehensive simulation to demonstrate the performance of proposed algorithms.","PeriodicalId":365750,"journal":{"name":"The Ninth International Conference on Mobile Data Management (mdm 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Grid-Based Access Scheduling for Mobile Data Intensive Sensor Networks","authors":"Chih-kuang Lin, V. Zadorozhny, P. Krishnamurthy","doi":"10.1109/MDM.2008.36","DOIUrl":"https://doi.org/10.1109/MDM.2008.36","url":null,"abstract":"We introduce a distributed grid-based scheduling access scheme that mitigates high data loss in data intensive sensor networks. Our approach alleviates transmission collisions by applying virtual grids and adopting Latin Squares Characteristic to time slot assignments. We demonstrate that our technique efficiently handles sensor mobility with acceptable data loss and low overhead.","PeriodicalId":365750,"journal":{"name":"The Ninth International Conference on Mobile Data Management (mdm 2008)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134422175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chia-Hao Lo, Wen-Chih Peng, Chien-Wen Chen, Ting-Yu Lin, Chun-Shuo Lin
{"title":"CarWeb: A Traffic Data Collection Platform","authors":"Chia-Hao Lo, Wen-Chih Peng, Chien-Wen Chen, Ting-Yu Lin, Chun-Shuo Lin","doi":"10.1109/MDM.2008.26","DOIUrl":"https://doi.org/10.1109/MDM.2008.26","url":null,"abstract":"In this paper, we exploit the concept of sharing GPS data for estimate traffic information. Explicitly, we implemented CarWeb, a platform to collect real-time GPS data from cars. Once receiving a sufficient amount of GPS data from cars, we are able to estimate traffic information (i.e., speed information of roads). As such, users are able to obtain the update-to-date traffic information in CarWeb platform. In addition, we propose two algorithms to estimate traffic information with GPS data given. A prototype of CarWeb is implemented and functionalities of each component in CarWeb are demonstrated in this paper.","PeriodicalId":365750,"journal":{"name":"The Ninth International Conference on Mobile Data Management (mdm 2008)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122357045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safe-Time: Distributed Real-Time Monitoring of cKNN in Mobile Peer-to-Peer Networks","authors":"Kihwan Kim, Ying Cai, Wallapak Tavanapong","doi":"10.1109/MDM.2008.18","DOIUrl":"https://doi.org/10.1109/MDM.2008.18","url":null,"abstract":"A continuous k nearest neighbor (cKNN) query is a query that continuously returns a set of k nearest moving objects (mobile hosts) to a given query point. For example, report three nearest moving sensors to a given location continuously. Most existing research efforts focus on centralized solutions. In a mobile peer-to-peer network (M-P2P), a centralized approach incurs expensive communication cost. In this paper, we propose Safe-Time - a distributed solution for cKNN given a stationary query point for M-P2P. The two key features are as follows. 1) Actual execution of a cKNN query is not needed during a safe-time period since the query result is guaranteed to remain the same during this period. 2) Once the safe-time expires, execution of a cKNN query involves only objects in a circular band of width equal to the estimated distance between the kth and the k + 1th nearest neighbors. To further reduce communication cost for dense queries, we introduce Unite-Safe-Time that executes one virtual query derived from nearby queries instead of executing each of them separately. Our simulation result shows that the proposed distributed solutions outperform a centralized solution under a range of conditions. Safe-Time incurs up to 2/3 less communication cost compared to a centralized solution. Unite-Safe-Time shows up to 1/3 less communication cost than Safe-Time in our study.","PeriodicalId":365750,"journal":{"name":"The Ninth International Conference on Mobile Data Management (mdm 2008)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127923420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Andreou, D. Zeinalipour-Yazti, Panos K. Chrysanthis, G. Samaras
{"title":"Workload-Aware Query Routing Trees in Wireless Sensor Networks","authors":"P. Andreou, D. Zeinalipour-Yazti, Panos K. Chrysanthis, G. Samaras","doi":"10.1109/MDM.2008.13","DOIUrl":"https://doi.org/10.1109/MDM.2008.13","url":null,"abstract":"Continuous queries in wireless sensor networks are established on the premise of a routing tree that provides each sensor with a path over which answers can be transmitted to the query processor. We found that these structures are sub- optimality constructed in predominant data acquisition systems leading to an enormous waste of energy. In this paper we present MicroPulse1, a workload-aware optimization algorithm for query routing trees in wireless sensor networks. Our algorithm is established on profiling recent data acquisition activity and on identifying the bottlenecks using an in-network execution of the critical path method. A node S utilizes this information in order to locally derive the time instance during which it should wake up, the interval during which it should deliver its workload and the workload increase tolerance of its parent node. We additionally provide an elaborate description of energy-conscious algorithms for disseminating and maintaining the critical path cost in a distributed manner. Our trace-driven experimentation with real sensor traces from Intel Research Berkeley shows that MicroPulse can reduce the data acquisition costs by many orders.","PeriodicalId":365750,"journal":{"name":"The Ninth International Conference on Mobile Data Management (mdm 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130805212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. McFaddin, D. Coffman, J. Han, H. Jang, J. Kim, J. K. Lee, M. C. Lee, Y. Moon, C. Narayanaswami, Y. S. Paik, J. Park, D. Soroker
{"title":"Modeling and Managing Mobile Commerce Spaces Using RESTful Data Services","authors":"S. McFaddin, D. Coffman, J. Han, H. Jang, J. Kim, J. K. Lee, M. C. Lee, Y. Moon, C. Narayanaswami, Y. S. Paik, J. Park, D. Soroker","doi":"10.1109/MDM.2008.38","DOIUrl":"https://doi.org/10.1109/MDM.2008.38","url":null,"abstract":"This paper advocates the use of RESTful data services in mobile commerce information spaces. REST is a restriction of web services to a simple protocol centered on a limited set of access operations against data resources. This paper analyzes how REST may be used as a general design principle for mobile commerce spaces. This analysis is threefold. First, it provides an abstract component model that contains a minimal embodiment of the REST functionality needed to support mobile commerce. Second, it describes and analyzes the operation of a mobile commerce space, resulting in a reference REST-based data decomposition that may be reused across a variety of domains. Third, it provides and analyzes a set of usage cases in the mobile commerce domain, which can form the basis of future REST-oriented programming models and tools. This analysis is based on a substantial mobile commerce framework we have implemented, called Celadon. This framework is currently being used to demonstrate several ambitious mobile commerce applications.","PeriodicalId":365750,"journal":{"name":"The Ninth International Conference on Mobile Data Management (mdm 2008)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124601288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LAOF: A New Framework to Efficiently Process Business Objects on Resource Constrained Mobile Phones","authors":"Huaigu Wu, Josh Borts, Yi Zheng, Yuri Natchetoi","doi":"10.1109/MDM.2008.15","DOIUrl":"https://doi.org/10.1109/MDM.2008.15","url":null,"abstract":"The increase in the number of mobile device users has led to an increased demand for mobile business applications. One of the main challenges in developing mobile business applications is to efficiently process business data in the resource constrained environment of mobile phones. Current approaches are seriously limited by the non-guaranteed quality of network connections or the restricted processing capabilities of mobile phones. We propose a lightweight asynchronous online framework (LAOF) that merges the benefits of both online and offline models. In our approach, business data is partially and lazily replicated to mobile phones. The mobile application executes read-only operations locally and tentatively simulates local responses to write operations before asynchronously executing on the remote server. The LAOF improves the traditional lazy replication approach by 1) efficiently compressing business data for mobile applications, 2) separating the consistency requirements for responses and business data, and 3) providing an approach that guarantees causal dependency for the asynchronous execution of write operations on the server side. In addition, we also demonstrate a sample application based on this approach and use it to evaluate the framework.","PeriodicalId":365750,"journal":{"name":"The Ninth International Conference on Mobile Data Management (mdm 2008)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124579869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Querying Imprecise Data in Sensor Databases","authors":"Z. Ma, Li Yan","doi":"10.1109/MDM.2008.9","DOIUrl":"https://doi.org/10.1109/MDM.2008.9","url":null,"abstract":"Sensors are used to monitor some physical phenomena such as contamination, climate, building, and so on. The sensors collect and communicate their readings to the sensor databases for making decisions and answering various user queries. Due to continuous changes and possible errors in these values, the data values recorded in sensor databases may differ from the actual status. Queries using these values can yield incorrect and misleading answers. In order to manage the imprecision between the actual sensor value and the database value, the framework representing imprecision of sensor data has been proposed, in which each data value is represented as an interval. In this paper, we examine the situation when answer imprecision can be represented qualitatively and quantitatively. In particular, we propose two new kinds of imprecise queries called Top-k imprecise query and imprecise threshold query. Also, we investigate techniques for evaluating the qualitative and quantitative queries.","PeriodicalId":365750,"journal":{"name":"The Ninth International Conference on Mobile Data Management (mdm 2008)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126023890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}