{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T16:20:00Z","timestamp":1770222000066,"version":"3.49.0"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319149769","type":"print"},{"value":"9783319149776","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14977-6_4","type":"book-chapter","created":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T09:23:24Z","timestamp":1422437004000},"page":"49-72","source":"Crossref","is-referenced-by-count":25,"title":["Geo-indistinguishability: A Principled Approach to Location Privacy"],"prefix":"10.1007","author":[{"given":"Konstantinos","family":"Chatzikokolakis","sequence":"first","affiliation":[]},{"given":"Catuscia","family":"Palamidessi","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Stronati","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Ball, J.: Angry birds and \u2018leaky\u2019 phone apps targeted by nsa and gchq for user data. The Guardian (2014), http:\/\/www.theguardian.com\/world\/2014\/jan\/27\/nsa-gchq-smartphone-app-angry-birds-personal-data"},{"key":"4_CR2","unstructured":"Please Rob Me, http:\/\/pleaserobme.com\/"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Fawaz, K., Shin, K.G.: Location privacy protection for smartphone users. In: Proc. of CCS, pp. 239\u2013250. ACM Press (2014)","DOI":"10.1145\/2660267.2660270"},{"key":"4_CR4","unstructured":"Brownlee, J.: This creepy app isn\u2019t just stalking women without their knowledge, it\u2019s a wake-up call about facebook privacy [update]. Cult of Mac (2012), http:\/\/www.cultofmac.com\/157641\/this-creepy-app-isnt-just-stalking-women-without-their-knowledge-its-a-wake-up-call-about-facebook-privacy\/"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-39077-7_5","volume-title":"Privacy Enhancing Technologies","author":"K. Chatzikokolakis","year":"2013","unstructured":"Chatzikokolakis, K., Andr\u00e9s, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the scope of Differential Privacy using metrics. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol.\u00a07981, pp. 82\u2013102. Springer, Heidelberg (2013)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Boudec, J.Y.L., Hubaux, J.P.: Quantifying location privacy. In: Proc. of S&P, pp. 247\u2013262. IEEE (2011)","DOI":"10.1109\/SP.2011.18"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proc. of CCS, pp. 901\u2013914. ACM (2013)","DOI":"10.1145\/2508859.2516735"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.P., Boudec, J.Y.L.: Protecting location privacy: optimal strategy against localization attacks. In: Proc. of CCS, pp. 617\u2013627. ACM (2012)","DOI":"10.1145\/2382196.2382261"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-08506-7_2","volume-title":"Privacy Enhancing Technologies","author":"K. Chatzikokolakis","year":"2014","unstructured":"Chatzikokolakis, K., Palamidessi, C., Stronati, M.: A predictive differentially-private mechanism for mobility traces. In: De Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol.\u00a08555, pp. 21\u201341. Springer, Heidelberg (2014)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Optimal geo-indistinguishable mechanisms for location privacy. In: Proc. of CCS (2014)","DOI":"10.1145\/2660267.2660345"},{"key":"4_CR12","unstructured":"Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: Proc. of SecureComm, pp. 194\u2013205. IEEE (2005)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Herrmann, M., Troncoso, C., Diaz, C., Preneel, B.: Optimal sporadic location privacy preserving systems in presence of bandwidth constraints. In: Proc. of WPES (2013)","DOI":"10.1145\/2517840.2517853"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos, G., Shokri, R., Troncoso, C., Hubaux, J., Boudec, J.L.: Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services. CoRR abs\/1409.1716 (2014)","DOI":"10.1145\/2665943.2665946"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-319-08506-7_10","volume-title":"Privacy Enhancing Technologies","author":"A.-M. Olteanu","year":"2014","unstructured":"Olteanu, A.-M., Huguenin, K., Shokri, R., Hubaux, J.-P.: Quantifying the effect of co-location information on location privacy. In: De Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol.\u00a08555, pp. 184\u2013203. Springer, Heidelberg (2014)"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of MobiSys. USENIX (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proc. of ICDCS, pp. 620\u2013629. IEEE (2005)","DOI":"10.1109\/ICDCS.2005.48"},{"key":"4_CR18","unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy. In: Proc. of VLDB, pp. 763\u2013774. ACM (2006)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: Proc. of ICDE Workshops, p. 1248 (2005)","DOI":"10.1109\/ICDE.2005.269"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Shankar, P., Ganapathy, V., Iftode, L.: Privately querying location-based services with SybilQuery. In: Proc. of UbiComp, pp. 31\u201340. ACM (2009)","DOI":"10.1145\/1620545.1620550"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: Proc. of WWW, pp. 237\u2013246. ACM (2008)","DOI":"10.21236\/ADA470490"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M. Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 152\u2013170. Springer, Heidelberg (2005)"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-01721-6_5","volume-title":"Location and Context Awareness","author":"M. Xue","year":"2009","unstructured":"Xue, M., Kalnis, P., Pung, H.: Location diversity: Enhanced privacy protection in location based services. In: Choudhury, T., Quigley, A., Strang, T., Suginuma, K. (eds.) LoCA 2009. LNCS, vol.\u00a05561, pp. 70\u201387. Springer, Heidelberg (2009)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Abowd, J.M., Gehrke, J., Vilhuber, L.: Privacy: Theory meets practice on the map. In: Proc. of ICDE, pp. 277\u2013286. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Ho, S.-S., Ruan, S.: Differential privacy for location pattern mining. In: Proc. of SPRINGL, pp. 17\u201324. ACM (2011)","DOI":"10.1145\/2071880.2071884"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Chen, R., \u00c1cs, G., Castelluccia, C.: Differentially private sequential data publication via variable-length n-grams. In: Proc. of CCS, pp. 638\u2013649. ACM (2012)","DOI":"10.1145\/2382196.2382263"},{"key":"4_CR27","unstructured":"Dewri, R.: Local differential perturbations: Location privacy under approximate knowledge attackers. IEEE Trans. on Mobile Computing 99(PrePrints), \u00a01 (2012)"},{"key":"4_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/11957454_23","volume-title":"Privacy Enhancing Technologies","author":"R. Cheng","year":"2006","unstructured":"Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 393\u2013412. Springer, Heidelberg (2006)"},{"key":"4_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-73538-0_4","volume-title":"Data and Applications Security XXI","author":"C.A. Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 47\u201360. Springer, Heidelberg (2007)"},{"key":"4_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-540-73540-3_14","volume-title":"Advances in Spatial and Temporal Databases","author":"A. Khoshgozaran","year":"2007","unstructured":"Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol.\u00a04605, pp. 239\u2013257. Springer, Heidelberg (2007)"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: anonymizers are not necessary. In: Proc. of SIGMOD, pp. 121\u2013132. ACM (2008)","DOI":"10.1145\/1376616.1376631"},{"issue":"2","key":"4_CR32","first-page":"103","volume":"4","author":"S. Gambs","year":"2011","unstructured":"Gambs, S., Killijian, M.O., del Prado Cortez, M.N.: Show me how you move and i will tell you who you are. Trans. on Data Privacy\u00a04(2), 103\u2013126 (2011)","journal-title":"Trans. on Data Privacy"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Gambs, S., Killijian, M., del Prado Cortez, M.N.: De-anonymization attack on geolocated data. In: Proc. of TrustCom 2013, pp. 789\u2013797. IEEE (2013)","DOI":"10.1109\/TrustCom.2013.96"},{"key":"4_CR34","unstructured":"Primault, V., Mokhtar, S.B., Lauradoux, C., Brunie, L.: Differentially private location privacy in practice. In: Proc. of MoST 2014. IEEE (2014)"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., Mcsherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"issue":"2","key":"4_CR36","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/10618600.1993.10474606","volume":"2","author":"K. Lange","year":"1993","unstructured":"Lange, K., Sinsheimer, J.S.: Normal\/independent distributions and their applications in robust regression. J. of Comp. and Graphical Statistics\u00a02(2), 175\u2013198 (1993)","journal-title":"J. of Comp. and Graphical Statistics"},{"key":"4_CR37","unstructured":"Location Guard, https:\/\/github.com\/chatziko\/location-guard"},{"key":"4_CR38","doi-asserted-by":"crossref","unstructured":"Narasimhan, G., Smid, M.: Geometric spanner networks. CUP (2007)","DOI":"10.1017\/CBO9780511546884"},{"key":"4_CR39","unstructured":"Sack, J., Urrutia, J.: Handbook of Computational Geometry. Elsevier (1999)"},{"issue":"2","key":"4_CR40","first-page":"32","volume":"33","author":"Y. Zheng","year":"2010","unstructured":"Zheng, Y., Xie, X., Ma, W.Y.: Geolife: A collaborative social networking service among user, location and trajectory. IEEE Data Eng. Bull.\u00a033(2), 32\u201339 (2010)","journal-title":"IEEE Data Eng. Bull."},{"key":"4_CR41","doi-asserted-by":"crossref","unstructured":"Yuan, J., Zheng, Y., Zhang, C., Xie, W., Xie, X., Sun, G., Huang, Y.: T-drive: driving directions based on taxi trajectories. In: GIS, pp. 99\u2013108 (2010)","DOI":"10.1145\/1869790.1869807"},{"key":"4_CR42","unstructured":"Shokri, R.: Optimal user-centric data obfuscation. Technical report, ETH Zurich (2014), http:\/\/arxiv.org\/abs\/1402.3426"},{"key":"4_CR43","doi-asserted-by":"crossref","unstructured":"Roth, A., Roughgarden, T.: Interactive privacy via the median mechanism. In: Proc. of STOC, pp. 765\u2013774 (2010)","DOI":"10.1145\/1806689.1806794"},{"key":"4_CR44","doi-asserted-by":"crossref","unstructured":"Hardt, M., Rothblum, G.N.: A multiplicative weights mechanism for privacy-preserving data analysis. In: FOCS, pp. 61\u201370. IEEE (2010)","DOI":"10.1109\/FOCS.2010.85"},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: STOC, pp. 715\u2013724. ACM (2010)","DOI":"10.1145\/1806689.1806787"},{"key":"4_CR46","doi-asserted-by":"crossref","unstructured":"Merrill, S., Basalp, N., Biskup, J., Buchmann, E., Clifton, C., Kuijpers, B., Othman, W., Savas, E.: Privacy through uncertainty in location-based services. In: IEEE 14th Int. Conf. on Mobile Data Management, pp. 67\u201372. IEEE Computer Society (2013)","DOI":"10.1109\/MDM.2013.71"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14977-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T22:08:19Z","timestamp":1747519699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14977-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319149769","9783319149776"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14977-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}