{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:24:57Z","timestamp":1775258697483,"version":"3.50.1"},"publisher-location":"Cham","reference-count":62,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319981604","type":"print"},{"value":"9783319981611","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98161-1_4","type":"book-chapter","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T15:59:02Z","timestamp":1540569542000},"page":"73-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Privacy Protection in Location-Based Services: A Survey"],"prefix":"10.1007","author":[{"given":"Claudio","family":"Bettini","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,27]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Preserving user location privacy in mobile data management infrastructures. Privacy Enhancing Technologies, LNCS 4258:393\u2013412, 2006.","DOI":"10.1007\/11957454_23"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"M. E. Andr\u00e9s, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-Indistinguishability: Differential Privacy for Location-Based Systems. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS), 2013.","DOI":"10.1145\/2508859.2516735"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/TDSC.2009.25","volume":"8","author":"C A Ardagna","year":"2011","unstructured":"C. A. Ardagna, M. Cremonini, S. D. Capitani, and P. Samarati. An Obfuscation-based Approach for Protecting Location Privacy. IEEE Transactions on Dependable and Secure Computing (TDSC), 8(1):13\u201327, 2011.","journal-title":"IEEE Transactions on Dependable and Secure Computing (TDSC)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"B. Bamba, L. Liu, P. Pesti, and T. Wang. Supporting anonymous location queries in mobile environments with PrivacyGrid. In Proc. Int. WWW Conf., pages 237\u2013246, 2008.","DOI":"10.1145\/1367497.1367531"},{"issue":"7","key":"4_CR5","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/s00779-010-0346-0","volume":"15","author":"M Benisch","year":"2011","unstructured":"M. Benisch, P. G. Kelley, N. Sadeh, and L. F. Cranor. Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs. Personal and Ubiquitous Computing, 15(7):679\u2013694, 2011.","journal-title":"Personal and Ubiquitous Computing"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"C. Bettini, S. Jajodia, and L. Pareschi. Anonymity and diversity in LBS: A preliminary investigation. In IEEE International Conference on Pervasive Computing and Communications Workshops, 2007.","DOI":"10.1109\/PERCOMW.2007.23"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"C. Bettini, S. Mascetti, D. Freni, X. S. Wang, and S. Jajodia. Privacy and anonymity in Location Data Management. In F. Bonchi and E. Ferrari, editors, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques. Chapman & Hall, 2010.","DOI":"10.1201\/b10373-13"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-03511-1","volume-title":"Privacy in Location-Based Applications","author":"Claudio Bettini","year":"2009","unstructured":"C. Bettini, S. Mascetti, X. Wang, D. Freni, and S. Jajodia. Anonymity and historical-anonymity in location-based services. In Privacy in location-based applications, volume LNCS 5599. Springer Berlin Heidelberg, 2009."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"C. Bettini, X. Wang, and S. Jajodia. Protecting privacy against location-based personal identification. In Proceedings of Secure Data Management, volume 3674 LNCS. Springer, 2005.","DOI":"10.1007\/11552338_13"},{"issue":"4","key":"4_CR10","first-page":"210","volume":"2017","author":"K Chatzikokolakis","year":"2017","unstructured":"K. Chatzikokolakis, E. Elsalamouny, and C. Palamidessi. Efficient Utility Improvement for Location Privacy. Proceedings on Privacy Enhancing Technologies (PoPET), 2017(4):210\u2013231, 2017.","journal-title":"Proceedings on Privacy Enhancing Technologies (PoPET)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"G. Cormode, C. Procopiuc, D. Srivastava, E. Shen, and T. Yu. Differentially private spatial decompositions. In Proceedings - International Conference on Data Engineering, pages 20\u201331, 2012.","DOI":"10.1109\/ICDE.2012.16"},{"issue":"2","key":"4_CR12","first-page":"123","volume":"3","author":"M L Damiani","year":"2010","unstructured":"M. L. Damiani, E. Bertino, and C. Silvestri. The PROBE framework for the personalized cloaking of private locations. Transactions on Data Privacy, 3(2):123\u2013148, 2010.","journal-title":"Transactions on Data Privacy"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, Naval Research Lab Washington DC, 2004.","DOI":"10.21236\/ADA465464"},{"key":"4_CR14","first-page":"152","volume-title":"Lecture Notes in Computer Science","author":"Matt Duckham","year":"2005","unstructured":"M. Duckham and L. Kulik. A Formal Model of Obfuscation and Negotiation for Location Privacy. In International Conference on Pervasive Computing, pages 152\u2013170. Springer Berlin Heidelberg, 2005."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"C. Dwork. Differential privacy: A survey of results. In International Conference on Theory and Applications of Models of Computation, pages 1\u201319. Springer, 2008.","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"4_CR16","first-page":"15","volume":"9","author":"E Elsalamouny","year":"2016","unstructured":"E. Elsalamouny and S. Gambs. Differential Privacy Models for Location- Based Services. Transactions on Data Privacy, 9:15\u201348, 2016.","journal-title":"Transactions on Data Privacy"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"K. Fawaz and K. G. Shin. Location privacy protection for smartphone users. In ACM Conference on Computer and Communications Security, 2014.","DOI":"10.1145\/2660267.2660270"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"D. Freni, S. Mascetti, C. Bettini, and M. Cozzi. Pcube: A system to evaluate and test privacy-preserving proximity services. In 2010 Eleventh International Conference on Mobile Data Management, pages 273\u2013275, May 2010.","DOI":"10.1109\/MDM.2010.45"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"B. Gedik and Ling Liu. Location Privacy in Mobile Systems: A Personalized Anonymization Model. In 25th IEEE International Conference on Distributed Computing Systems (ICDCS\u201905), pages 620\u2013629, 2005.","DOI":"10.1109\/ICDCS.2005.48"},{"issue":"1","key":"4_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00485ED1V01Y201303SPT004","volume":"4","author":"G Ghinita","year":"2013","unstructured":"G. Ghinita. Privacy for location-based services. Synthesis Lectures on Information Security, Privacy & Trust, 4(1):1\u201385, 2013.","journal-title":"Synthesis Lectures on Information Security, Privacy & Trust"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, pages 121\u2013132. ACM, 2008.","DOI":"10.1145\/1376616.1376631"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"G. Ghinita, P. Kalnis, and S. Skiadopoulos. MOBIHIDE: a mobilea peer-to-peer system for anonymous location-based queries. Advances in spatial and temporal databases, pages 221\u2013238, 2007.","DOI":"10.1007\/978-3-540-73540-3_13"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: anonymous location-based queries in distributed mobile systems. In Proceedings of the 16th international conference on World Wide Web, pages 371\u2013380. ACM, 2007.","DOI":"10.1145\/1242572.1242623"},{"issue":"2","key":"4_CR24","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/293411.293443","volume":"42","author":"D Goldschlag","year":"1999","unstructured":"D. Goldschlag, M. Reed, and P. Syverson. Onion routing. Communications of the ACM, 42(2):39\u201341, 1999.","journal-title":"Communications of the ACM"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services - MobiSys \u201903, pages 31\u201342, 2003.","DOI":"10.1145\/1066116.1189037"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"A. Gutscher. Coordinate transformation-a solution for the privacy problem of location based services? In Parallel and Distributed Processing Symposium, 2006. IPDPS 2006. 20th International, pages 7\u2014-pp. IEEE, 2006.","DOI":"10.1109\/IPDPS.2006.1639681"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"T. Hashem, L. Kulik, and R. Zhang. Privacy preserving group nearest neighbor queries. In Proceedings of the 13th International Conference on Extending Database Technology, pages 489\u2013500. ACM, 2010.","DOI":"10.1145\/1739041.1739100"},{"issue":"11","key":"4_CR28","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.14778\/2809974.2809978","volume":"8","author":"X He","year":"2015","unstructured":"X. He, G. Cormode, A. Machanavajjhala, C. M. Procopiuc, and D. Srivastava. DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems. Proceedings of the VLDB Endowment, 8(11):1154\u20131165, 2015.","journal-title":"Proceedings of the VLDB Endowment"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"H. Hu and J. Xu. Non-exposure location anonymity. In Proceedings - International Conference on Data Engineering, pages 1120\u20131131, 2009.","DOI":"10.1109\/ICDE.2009.106"},{"key":"4_CR30","unstructured":"R. P. Jay. Data protection & privacy in 31 jurisdictions worldwide. Gideon Roberton, Law Business Research Ltd, 2015."},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"C. S. Jensen, H. Lu, and M. L. Yiu. Location privacy techniques in client-server architectures. In Privacy in location-based applications, pages 31\u201358. Springer, 2009.","DOI":"10.1007\/978-3-642-03511-1_2"},{"issue":"12","key":"4_CR32","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kalnis","year":"2007","unstructured":"P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12):1719\u20131733, 2007.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4_CR33","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-03511-1_3","volume-title":"Privacy in Location-Based Applications","author":"Ali Khoshgozaran","year":"2009","unstructured":"A. Khoshgozaran and C. Shahabi. Private information retrieval techniques for enabling location privacy in location-based services. In Privacy in Location-Based Applications, volume 0831505, pages 59\u201383. Springer Berlin Heidelberg, 2009."},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"H. Kido, Y. Yanagisawa, and T. Satoh. Protection of location privacy using dummies for location-based services. In 21st International Conference on Data Engineering Workshops., page 1248. IEEE, 2005.","DOI":"10.1109\/ICDE.2005.269"},{"issue":"6","key":"4_CR35","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J Krumm","year":"2009","unstructured":"J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing, 13(6):391\u2013399, 2009.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"4","key":"4_CR36","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/s00779-012-0610-6","volume":"17","author":"J Lin","year":"2013","unstructured":"J. Lin, M. Benisch, N. Sadeh, J. Niu, J. Hong, B. Lu, and S. Guo. A comparative study of location-sharing privacy preferences in the United States and China. Personal and Ubiquitous Computing, 17(4):697\u2013711, Apr 2013.","journal-title":"Personal and Ubiquitous Computing"},{"key":"4_CR37","unstructured":"B. Liu, M. S. Andersen, F. Schaub, H. Almuhimedi, S. Zhang, N. Sadeh, A. Acquisti, and Y. Agarwal. Follow my recommendations: A personalized privacy assistant for mobile app permissions. In Symposium on Usable Privacy and Security."},{"key":"4_CR38","first-page":"297","volume":"2006","author":"K Liu","year":"2006","unstructured":"K. Liu, C. Giannella, and H. Kargupta. An attacker\u2019s view of distance preserving maps for privacy preserving data mining. Knowledge Discovery in Databases: PKDD 2006, pages 297\u2013308, 2006.","journal-title":"Knowledge Discovery in Databases: PKDD"},{"key":"4_CR39","doi-asserted-by":"crossref","unstructured":"H. Lu, C. S. Jensen, and M. L. Yiu. PAD: Privacy-Area Aware, Dummy-Based Location Privacy in Mobile Services. In Proceedings of the CM International Workshop on Data Engineering for Wireless and Mobile Access (MobiDE), pages 16\u201323, 2008.","DOI":"10.1145\/1626536.1626540"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity : Privacy beyond k-anonymity. In Proceedings - International Conference on Data Engineering, 2006.","DOI":"10.1109\/ICDE.2006.1"},{"key":"4_CR41","doi-asserted-by":"crossref","unstructured":"S. Mascetti, L. Bertolaja, and C. Bettini. A practical location privacy attack in proximity services. In Proceedings - IEEE International Conference on Mobile Data Management, 2013.","DOI":"10.1109\/MDM.2013.19"},{"key":"4_CR42","first-page":"131","volume":"7","author":"S Mascetti","year":"2014","unstructured":"S. Mascetti, L. Bertolaja, and C. Bettini. SafeBox : adaptable spatio-temporal generalization for location privacy protection. Transactions on Data Privacy, 7:131\u2013163, 2014.","journal-title":"Transactions on Data Privacy"},{"issue":"3","key":"4_CR43","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1080\/17489720801941789","volume":"1","author":"S Mascetti","year":"2007","unstructured":"S. Mascetti, C. Bettini, D. Freni, and X. S. Wang. Spatial generalisation algorithms for LBS privacy preservation. Journal of Location Based Services, 1(3):179\u2013207, 2007.","journal-title":"Journal of Location Based Services"},{"issue":"4","key":"4_CR44","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/s00778-010-0213-7","volume":"20","author":"Sergio Mascetti","year":"2010","unstructured":"S. Mascetti, D. Freni, C. Bettini, X. Wang, and S. Jajodia. Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies. VLDB Journal, 20(4), 2011.","journal-title":"The VLDB Journal"},{"key":"4_CR45","unstructured":"M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: Query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on Very large data bases, pages 763\u2013774. VLDB Endowment, 2006."},{"key":"4_CR46","unstructured":"Y.-a. D. Montjoye, M. Verleysen, and V. D. Blondel. Unique in the Crowd: The privacy bounds of human mobility. Scientific Reports, 3(1376):1\u20135, 2013."},{"key":"4_CR47","unstructured":"E. Parliament and Council. General data protection regulation - 2016\/679. Technical report, European Commission, 2016."},{"key":"4_CR48","unstructured":"A. D. P. W. Party. Opinion 13\/2011 on geolocation services on smart mobile devices. Technical report, European Commission, 2011."},{"key":"4_CR49","unstructured":"E. A. D. P. W. Party. Opinion 2\/2017 on data processing at work - wp249. Technical report, European Commission, 2017."},{"issue":"11","key":"4_CR50","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"A. Shamir. How to share a secret. Communications of the ACM, 22(11):612\u2013613, 1979.","journal-title":"Communications of the ACM"},{"key":"4_CR51","doi-asserted-by":"crossref","unstructured":"P. Shankar, V. Ganapathy, and L. Iftode. Privately querying location-based services with SybilQuery. In Proceedings of the 11th international conference on Ubiquitous computing, pages 31\u201340. ACM, 2009.","DOI":"10.1145\/1620545.1620550"},{"issue":"2","key":"4_CR52","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1515\/popets-2015-0024","volume":"2015","author":"Reza Shokri","year":"2015","unstructured":"R. Shokri. Privacy Games : Optimal User-Centric Data Obfuscation. In Proceedings on Privacy Enhancing Technologies, pages 299\u2013315, 2015.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"4_CR53","unstructured":"R. Shokri, G. Theodorakopoulos, and C. Troncoso. ACM Transactions on Privacy and Security (TOPS)."},{"key":"4_CR54","doi-asserted-by":"crossref","unstructured":"E. Snekkenes. Concepts for personal location privacy policies. In Proceedings of the 3rd ACM conference on Electronic Commerce, pages 48\u201357. ACM, 2001.","DOI":"10.1145\/501158.501164"},{"key":"4_CR55","doi-asserted-by":"crossref","unstructured":"E. Toch, J. Cranshaw, P. Hankes-Drielsma, J. Springfield, P. G. Kelley, L. Cranor, J. Hong, and N. Sadeh. Locaccino: A privacy-centric location sharing application. In Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing - Adjunct, UbiComp \u201910 Adjunct, pages 381\u2013382, New York, NY, USA, 2010. ACM.","DOI":"10.1145\/1864431.1864446"},{"issue":"3","key":"4_CR56","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MIC.2011.29","volume":"15","author":"C R Vicente","year":"2011","unstructured":"C. R. Vicente, D. Freni, C. Bettini, and C. S. Jensen. Location-related privacy in geo-social networks. IEEE Internet Computing, 15(3):20\u201327, 2011.","journal-title":"IEEE Internet Computing"},{"key":"4_CR57","doi-asserted-by":"crossref","unstructured":"M. Wernke, F. Durr, and K. Rothermel. PShare: Position sharing for location privacy based on multi-secret sharing. In 2012 IEEE International Conference on Pervasive Computing and Communications, pages 153\u2013161, 2012.","DOI":"10.1109\/PerCom.2012.6199862"},{"issue":"1","key":"4_CR58","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s00779-012-0633-z","volume":"18","author":"M Wernke","year":"2014","unstructured":"M. Wernke, P. Skvortsov, F. Durr, and K. Rothermel. A classification of location privacy attacks and approaches. Personal and Ubiquitous Computing, 18(1):163\u2013175, 2014.","journal-title":"Personal and Ubiquitous Computing"},{"key":"4_CR59","doi-asserted-by":"crossref","unstructured":"Y. Xiao and L. Xiong. Protecting Locations with Differential Privacy under Temporal Correlations. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), pages 1298\u20131309, 2015.","DOI":"10.1145\/2810103.2813640"},{"issue":"12","key":"4_CR60","doi-asserted-by":"publisher","first-page":"1901","DOI":"10.14778\/3137765.3137804","volume":"10","author":"Y Xiao","year":"2017","unstructured":"Y. Xiao, L. Xiong, S. Zhang, and Y. Cao. LocLok: Location Cloaking with Differential Privacy via Hidden Markov Model. Proceedings of the VLDB Endowment (VLDB), 10(12):1901\u20131904, 2017.","journal-title":"Proceedings of the VLDB Endowment (VLDB)"},{"key":"4_CR61","doi-asserted-by":"crossref","unstructured":"M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu. SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In IEEE International Conference on Data Engineering (ICDE), pages 366\u2013375, 2008.","DOI":"10.1109\/ICDE.2008.4497445"},{"key":"4_CR62","doi-asserted-by":"crossref","unstructured":"G. Zhong, I. Goldberg, and U. Hengartner. Louis, lester and pierre: Three protocols for location privacy. In Privacy Enhancing Technologies, pages 62\u201376. Springer, 2007.","DOI":"10.1007\/978-3-540-75551-7_5"}],"container-title":["Handbook of Mobile Data Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98161-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:03:07Z","timestamp":1775253787000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98161-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319981604","9783319981611"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98161-1_4","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}