Exploring end user preferences for location obfuscation, location-based services, and the value of location

Author(s):  
A.J. Bernheim Brush ◽  
John Krumm ◽  
James Scott
2021 ◽  
Author(s):  
Claus Rinner ◽  
Martin Raubal

Location-based services (LBS) assist people in decision-making during the performance of tasks in space and time. Current LBS support spatial and attribute queries, such as finding the nearest Italian restaurant from the current location of the user, but they are limited in their capacity to evaluate decision alternatives and to consider individual decision-makers’ user preferences. We suggest that LBS should provide personalized spatial decision support to their users. In a prototype implementation, we demonstrate how user preferences can be translated into parameters of a multi-criteria evaluation method. In particular, the Ordered Weighted Averaging (OWA) operator allows users to specify a personal decision strategy. A traveler scenario investigating the influence of different types of users and different decision strategies on the outcome of the analysis serves as a case study.


Information ◽  
2019 ◽  
Vol 10 (4) ◽  
pp. 121
Author(s):  
Mulugeta Kassaw Tefera ◽  
Xiaolong Yang

The wide-ranging application of location-based services (LBSs) through the use of mobile devices and wireless networks has brought about many critical privacy challenges. To preserve the location privacy of users, most existing location privacy-preserving mechanisms (LPPMs) modify their real locations associated with different pseudonyms, which come at a cost either in terms of resource consumption or quality of service, or both. However, we observed that the effect of resource consumption has not been discussed in existing studies. In this paper, we present the user-centric LPPMs against location inference attacks under the consideration of both service quality and energy constraints. Moreover, we modeled the precision-based and dummy-based mechanisms in the context of an existing LPPM framework, and also extended the linear program solutions applicable to them. This study allowed us to specify the LPPMs that decreased the precision of exposed locations or generated dummy locations of the users. Based on this, we evaluated the privacy protection effects of optimal location obfuscation function against an adversary's inference attack function using real mobility datasets. The results indicate that dummy-based mechanisms provide better achievable location privacy under a given combination of service quality and energy constraints, and once a certain level of privacy is reached, both the precision-based and dummy-based mechanisms only perturb the exposed locations. The evaluation results also contribute to a better understanding for the LPPM design strategies and evaluation mechanism as far as the system resource utilization and service quality requirements are concerned.


Author(s):  
Tamara Babaian

Personalization has been identified as a key task to the success of many modern systems. As Riecken (2000, p. 28) writes in the editorial of the special issue of the Communications of the ACM devoted to this subject, “personalization means something different to everyone.” Personalization can take various forms; however, it can be broadly described as the set of mechanisms by which an application is tailored to a particular end user and his or her goal.


2020 ◽  
Author(s):  
Laurenda Honfozo ◽  
Laurent Adinsi ◽  
Alexandre Bouniol ◽  
Sounkoura Adetonah ◽  
Lora Forsythe ◽  
...  

Author(s):  
Laurenda Honfozo ◽  
Laurent Adinsi ◽  
Alexandre Bouniol ◽  
Sounkoura Adetonah ◽  
Lora Forsythe ◽  
...  
Keyword(s):  

2005 ◽  
Vol 1 (3) ◽  
pp. 137-143
Author(s):  
Nikos Manouselis ◽  
Andreas M. Maras

This paper presents the development of an agent-based Virtual Private Network (VPN) system that supports multimedia service brokering. The VPN agents employ multi-attribute preference models in order to represent the end-user preferences, and a multi-criteria decision making model to evaluate available services from network providers. A prototype multi-agent system demonstrating the proposed approach has also been implemented.


Sign in / Sign up

Export Citation Format

Share Document