ABSTRACT
Portions reprinted with permission, from “Location Privacy for Users of Wireless Devices through Cloaking” from the Proceedings of the 41st Hawaii International Conference on System Sciences, Waikoloa, HI, 2008. © IEEE
CONTENTS
9.1 Introduction ................................................................................................ 208 9.2 Selecting a Location System to Support Privacy ................................... 209 9.3 Cloaking to Protect Online Privacy ........................................................ 209
9.3.1 Previous work in online location privacy .................................. 210 9.3.2 Mathematical foundation of cloaking ......................................... 211 9.3.3 Cloaking system ............................................................................. 212
9.3.3.1 Rounding .......................................................................... 213 9.3.3.2 Truncating ........................................................................ 213 9.3.3.3 Geodetic resolution ......................................................... 213 9.3.3.4 Randomization ................................................................ 215
9.3.4 System analysis .............................................................................. 217 9.3.5 Resources ........................................................................................ 217
9.3.5.1 Power ................................................................................ 218 9.3.5.2 Memory ............................................................................ 219 9.3.5.3 Run-time memory ........................................................... 219 9.3.5.4 Bandwidth ........................................................................ 219
9.4 Problems with Corporate Tracking ......................................................... 220 9.5 Protecting Privacy by Using Prediction ................................................. 221
9.5.1 Location determination ................................................................. 221 9.5.1.1 Symbolic location ............................................................222