Towards successive privacy protection in sensor networks

Baokang Zhao, Dan Wang, Zili Shao, Jiannong Cao, Chun Chung Chan, Jinshu Su, Yanqin Yang

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

1 Citation (Scopus)


With the emerging embedding of the sensor networks into the pervasive environment, our capabilities on location information gathering and processing have been greatly improved. Although this information is very useful, it also brings great challenges for protecting the privacy. Currently, most research efforts focus on protecting current location, and ignore the internal relationship among the successive locations. To date, there are many techniques to infer a location when the related successive information is published, and which bring in serious privacy and security concerns. In this paper, we for the first time consider this kind of relationship, and identify a novel successive privacy threat. We then formulate a generic model for protecting the successive privacy. Under this model, there is a tradeoff between the number of data to be published and the privacy protecting level, and which brings a novel maximum publishable location privacy problem. As this problem is intractable, we develop several heuristics. Extensive simulations demonstrate the effectiveness of our schemes.
Original languageEnglish
Title of host publicationProceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008
Number of pages6
Publication statusPublished - 1 Dec 2008
Event5th International Conference on Embedded and Ubiquitous Computing, EUC 2008 - Shanghai, China
Duration: 17 Dec 200820 Dec 2008


Conference5th International Conference on Embedded and Ubiquitous Computing, EUC 2008

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Communication


Dive into the research topics of 'Towards successive privacy protection in sensor networks'. Together they form a unique fingerprint.

Cite this