321
Views
5
CrossRef citations to date
0
Altmetric
Articles

The Price of Privacy Control in Mobility Sharing

ORCID Icon, ORCID Icon & ORCID Icon

References

  • U. M. Aïvodji, S. Gambs, M.-J. Huguet, and M.-O. Killijian, “Meeting Points in Ridesharing: A Privacy-Preserving Approach,” Transportation Research Part C: Emerging Technologies 72 (2016) 239–253. doi: 10.1016/j.trc.2016.09.017
  • U. M. Aı¨vodji, K. Huguenin, M.-J. Huguet, and M.-O. Killijian, “Sride: A Privacy-Preserving Ridesharing System,” paper presented at the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks (New York, USA, 2018).
  • M. E. Andŕes, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, “Geo-Indistinguishability: Differential Privacy for Location-Based Systems,” paper presented (Stockholm, June 18020, 2018) ACM SIGSAC Conference on Computer & Communications Security (Berlin, Germany, November 4–8, 2013) https://doi.org/10.1145/2508859.2516735.
  • B. Bamba, L. Liu, P. Pesti, and T. Wang, “Supporting Anonymous Location Queries in Mobile Environments with Privacygrid,” paper presented at the 17th International Conference on World Wide Web (Beijing, China, April 21–25, 2008) DOI: 10.1145/1367497.1367531.
  • C. Bettini, S. Mascetti, X. S. Wang, D. Freni, and S. Jajodia, “Anonymity and Historical-Anonymity in Location-Based Services,” in C. Bettini, S. Jajodia, P. Samarati, X.S. Wang, eds, Privacy in Location-Based Applications (Berlin: Springer, 2009).
  • I. Bilogrevic, M. Jadliwala, V. Joneja, K. Kalkan, J. Hubaux, and I. Aaz, “Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices,” IEEE Transactions on Information Forensics and Security 9: 7 (2014) 1141–1156. doi: 10.1109/TIFS.2014.2318435
  • E. Blumenberg and M. Smart, “Getting by With a Little Help From my Friends and Family: Immigrants and Carpooling,” Transportation 37: 3 (2010) 429–446. doi: 10.1007/s11116-010-9262-4
  • L. Buttýan, T. Holczer, and I. Vajda, “On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANets,” in F. Stajano, C. Meadows, S. Capkun, and T. Moore, eds, Security and Privacy in Ad-Hoc and Sensor Networks (Berlin: Springer, 2007).
  • D. Calacci, A. Berke, K. Larson, and A. Pentland, “The Tradeoff Between the Utility and Risk of Location Data and Implications for Public Good,” arXiv (2019) <https://arxiv.org/abs/1905.09350v2> Accessed July 1, 2020.
  • R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar, “Preserving User Location Privacy in Mobile Data Management Infrastructures,” in G. Danezis and P. Golle, eds, Privacy Enhancing Technologies (Berlin: Springer, 2006).
  • City of Pisa, “ Mobilitando Pisa Initiative” (2016) <https://www.comune.pisa.it/mobilitandopisa/> Accessed July 1, 2020.
  • G. Cleary, “Mobile Privacy: What Do Your Apps Know About You?” (2018) <https://www.symantec.com/blogs/threat-intelligence/mobile-privacy-apps> Accessed July 1, 2020.
  • Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, “Unique in the Crowd: The Privacy Bounds of Human Mobility,” Scientific Reports 3: 3 (2013) 1376 DOI: 10.1038/srep01376.
  • M. Duckham and L. Kulik, “A Formal Model of Obfuscation and Negotiation for Location Privacy,” paper presented at the Third International Conference on Pervasive Computing (Munich, Germany, May 8–13, 2005). DOI: 10.1007/11428572_10.
  • C. Dwork, “Differential Privacy,” in M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, eds, Automata, Languages and Programming (Berlin: Springer, 2006).
  • D. Eckhoff, R. German, C. Sommer, F. Dressler, and T. Gansen, “Slotswap: Strong and Affordable Location Privacy in Intelligent Transportation Systems,” IEEE Communications Magazine 49: 11 (2011) 126–133. doi: 10.1109/MCOM.2011.6069719
  • L. Feiler, “The Legality of the Data Retention Directive in Light of the Fundamental Rights to Privacy and Data Protection,” European Journal of Law and Technology 1: 3 (2010) 1–34.
  • J. Gao, L. Sun, and M. Cai, “Quantifying Privacy Vulnerability of Individual Mobility Traces: A Case Study of License Plate Recognition Data,” Transportation Research Part C: Emerging Technologies 104 (2019) 78–94. doi: 10.1016/j.trc.2019.04.022
  • B. Gedik and L. Liu, “Location Privacy in Mobile Systems: A Personalized Anonymization Model,” paper presented at the 25th IEEE International Conference on Distributed Computing Systems (Columbus, OH, USA, June 6–10, 2005) DOI: 10.1109/ICDCS.2005.48.
  • P. Goel, L. Kulik, and K. Ramamohanarao, “Privacy-Aware Dynamic Ride Sharing. ACM Trans. Spatial Algorithms Systems 2: 1 (2016) 4 :1–4:41. doi: 10.1145/2845080
  • M. Gruteser and D. Grunwald, “Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking,” paper presented at the First International Conference on Mobile Systems, Applications and Services (San Francisco CA, USA, May 6–8, 2003) https://doi.org/10.1145/1066116.1189037.
  • S.-S. Ho and S. Ruan, “Differential Privacy for Location Pattern Mining,” paper presented at the Fourth ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (Chicago, IL, USA, November 1–4, 2011) https://doi.org/10.1145/2071880.2071884.
  • B. Hoh and M. Gruteser, “Protecting Location Privacy Through Path Confusion,” paper presented at the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (Athens, Greece, September s–-9 2005) DOI: 10.1109/SECURECOMM.2005.33.
  • B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, “Enhancing Security and Privacy in Traffic-Monitoring Systems,” IEEE Pervasive Computing 5: 4 (2006) 38–46. doi: 10.1109/MPRV.2006.69
  • ISTAT (Istituto Nazionale di Statistica). Basi Territoriali. (2011) <http://www.istat.it/storage/cartografia/basi_territoriali/WGS_84_UTM/2011/R09_11_WGS84.zip> Accessed July 1, 2020.
  • H. Kido, Y. Yanagisawa, and T. Satoh, “Protection of Location Privacy Using Dummies for Location-Based Services,” paper presented at the Twenty-First International Conference on Data Engineering Workshops (Tokyo, Japan, April 3–4, 2005) https://doi.org/10.1109/ICDE.2005.269.
  • M. Li, L. Zhu, and X. Lin, “Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing,” IEEE Internet of Things Journals 6:3 (2019) 4573–4584. doi: 10.1109/JIOT.2018.2868076
  • S. Lian, T. Cha, and Y. Xu, “Enhancing Geotargeting With Temporal Targeting, Behavioral Targeting and Promotion for Comprehensive Contextual Targeting,” Decision Support Systems 117: (2019) 28–37. doi: 10.1016/j.dss.2018.12.004
  • F. Liao, E. Molin, H. Timmermans, and B. van Wee, “Carsharing: The Impact of System Characteristics on Its Potential to Replace Private Car Trips and Reduce Car Ownership,” Transportation 47: 2 (2020) 935–970. doi: 10.1007/s11116-018-9929-9
  • F. Librino, M. E. Renda, G. Resta, P. Santi, F. Duarte, C. Ratti, and J. Zhao, “Social Mixing and Home–work Carpooling,” paper presented at the Transportation Research Board 97th Annual Meeting (Washington D.C., USA, January 7–11, 2018).
  • F. Librino, M. E. Renda, P. Santi, F. Martelli, G. Resta, F. Duarte, C. Ratti, and J. Zhao, “Home–work Carpooling for Social Mixing,” Transportation: PlanningPolicyResearchPractice (2019) https://doi.org/10.1007/s11116-019-10038-2.
  • Y. Luo, X. Jia, S. Fu, and M. Xu, “pRide: Privacy-Preserving Ride Matching Over Road Networks for Online Ride-Hailing Service,” IEEE Transactions on Information Forensics and Security 14: 7 (2019) 1791–1802. doi: 10.1109/TIFS.2018.2885282
  • C. Y. T. Ma, D. K. Y. Yau, N. K. Yip, and N. S. V. Rao, “Privacy Vulnerability of Published Anonymous Mobility Traces,” IEEE/ACM Transactions on Networking 21: 3 (2013) 720–733. doi: 10.1109/TNET.2012.2208983
  • A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, “L-Diversity: Privacy Beyond K-Anonymity,” paper presented at the 22nd International Conference on Data Engineering (Atlanta, GA, USA, April 3–7, 2006) https://doi.org/10.1145/1217299.1217302.
  • The Manifest, “Data Privacy Concerns: An Overview for 2019,” Medium (March 12, 2019) <https://medium.com/@the_manifest/data-privacy-concerns-an-overview-for-2019-2ccea79aa6f8> Accessed July 1, 2020.
  • M. Maiouak and T. Taleb, “Dynamic Maps for Automated Driving and UAV Geofencing,” IEEE Wireless Communications 26: 4 (2019) 54–59. doi: 10.1109/MWC.2019.1800544
  • M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The New Casper: Query Processing for Location Services Without Compromising Privacy,” paper presented at the 32nd International Conference on Very Large Data Bases (Seoul, Korea, September 12–15, 2006) https://doi.org/10.1145/1620585.1620591.
  • M. Nabil, A. Sherif, M. Mahmoud, A. Alsharif, and M. Abdallah, “Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services,” IEEE Transactions on Dependable and Secure Computing (2019) DOI: 10.1109/TDSC.2019.2920647.
  • J. G. Neoh, M. Chipulu, and A. Marshall, “What Encourages People to Carpool? An Evaluation of Factors with Meta-Analysis,” Transportation 44: 2 (2017) 423–447. doi: 10.1007/s11116-015-9661-7
  • P. Santi, G. Resta, M. Szell, S. Sobolevsky, S. H. Strogatz, and C. Ratti, “Quantifying the Benefits of Vehicle Pooling with Shareability Networks,” Proceedings of the National Academy of Sciences 111: 37 (2014) 13290–13294. doi: 10.1073/pnas.1403657111
  • P. Shankar, V. Ganapathy, and L. Iftode, “Privately Querying Location-Based Services with Sybilquery,” paper presented at the Eleventh International Conference on Ubiquitous Computing (Orlando, Florida, USA, September 30-October 3, 2009) DOI: 10.1145/1620545.1620550.
  • A. B. T. Sherif, K. Rabieh, M. M. E. A. Mahmoud, and X. Liang, “Privacy-Preserving Ride Sharing Scheme for Autonomous Vehicles in Big Data Era,” IEEE Internet of Things Journal 4: 2 (2017) 611–618. doi: 10.1109/JIOT.2016.2569090
  • L. Stenneth and P. S. Yu, “Global Privacy and Transportation Mode Homogeneity Anonymization in Location-Based Mobile Systems with Continuous Queries,” paper presented at the Sixth International Conference on Collaborative Computing: Networking, Applications and Work-Sharing (Chicago, IL, USA, October 9–12, 2010) DOI: 10.4108/icst.collaboratecom.2010.8.
  • V. Sucasas, G. Mantas, F. B. Saghezchi, A. Radwan, and J. Rodriguez, “An Autonomous Privacy-Preserving Authentication Scheme for Intelligent Transportation Systems,” Computers & Security 60 (2016) 193–205. doi: 10.1016/j.cose.2016.04.006
  • Z. Sun, B. Zan, X. J. Ban, and M. Gruteser, “Privacy Protection Method for Fine-Grained Urban Traffic Modeling Using Mobile Sensors,” Transportation Research Part B: Methodological 56 (2013) 50–69. doi: 10.1016/j.trb.2013.07.010
  • L. Sweeney, “K-anonymity: A Model for Protecting Privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10: 5 (2002) 557–570. doi: 10.1142/S0218488502001648
  • R. Tachet des Combes, O. J. Sagarra Pascual, P. Santi, G. Resta, M. Szell, S. H. Strogatz, and C. Ratti, “Scaling Law of Urban Ride Sharing,” Nature Scientific Reports 7: 42868 (2017) DOI: 10.1038/srep42868.
  • J. Valentino-DeVries, Natasha Singer, M. H. Keller and A. Krolik, “Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret,” New York Times (December 10, 2018) <https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html> Accessed June 1, 2020.
  • Y. Xi, L. Schwiebert, and W. Shi, “Privacy Preserving Shortest Path Routing With an Application to Navigation,” Pervasive and Mobile Computing 13 (2014) 142–149. doi: 10.1016/j.pmcj.2013.06.002
  • M. Xue, P. Kalnis, and H. K. Pung, “Location Diversity: Enhanced Privacy Protection in Location-Based Services,” in T. Choudhury, A. Quigley, T. Strang, and K. Suginuma, eds, Location and Context Awareness (Berlin: Springer, 2009).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.