{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:17:01Z","timestamp":1740122221957,"version":"3.37.3"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T00:00:00Z","timestamp":1576800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Geoinformatica"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s10707-019-00389-4","type":"journal-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T08:03:46Z","timestamp":1576829026000},"page":"533-580","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Mobile participatory sensing with strong privacy guarantees using secure probes"],"prefix":"10.1007","volume":"25","author":[{"given":"Iulian Sandu","family":"Popa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3935-2471","authenticated-orcid":false,"given":"Dai Hai Ton","family":"That","sequence":"additional","affiliation":[]},{"given":"Karine","family":"Zeitouni","sequence":"additional","affiliation":[]},{"given":"Cristian","family":"Borcea","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,20]]},"reference":[{"issue":"2","key":"389_CR1","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s10619-013-7122-x","volume":"32","author":"T Allard","year":"2014","unstructured":"Allard T, Nguyen B, Pucheral P (2014) METAP: Revisiting privacy-preserving data publishing using secure devices. Distributed and Parallel Databases 32(2):191\u2013244","journal-title":"Distributed and Parallel Databases"},{"key":"389_CR2","doi-asserted-by":"publisher","unstructured":"Andr\u00e9s ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: Differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security. CCS \u201913. ACM, New York, pp 901\u2013914 , https:\/\/doi.org\/10.1145\/2508859.2516735","DOI":"10.1145\/2508859.2516735"},{"key":"389_CR3","unstructured":"ARM (2009) ARM security technology - building a secure system using trustzone technology. ARM Technical White Paper"},{"key":"389_CR4","unstructured":"Baumann A, Peinado M, Hunt G (2014) Shielding applications from an untrusted cloud with haven. In: OSDI, pp 267\u2013283"},{"issue":"2","key":"389_CR5","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1023\/A:1015231126594","volume":"6","author":"T Brinkhoff","year":"2002","unstructured":"Brinkhoff T (2002) A framework for generating network-based moving objects. GeoInformatica 6(2):153\u2013180","journal-title":"GeoInformatica"},{"key":"389_CR6","doi-asserted-by":"crossref","unstructured":"Brown JWS, Ohrimenko O, Tamassia R (2013) Haze: Privacy-preserving real-time traffic statistics. In: ACM SIGSPATIAL, pp 540\u2013543","DOI":"10.1145\/2525314.2525323"},{"key":"389_CR7","doi-asserted-by":"crossref","unstructured":"Cao Y, Yoshikawa M, Xiao Y, Xiong L (2017) Quantifying differential privacy under temporal correlations. In: 2017 IEEE 33rd international conference on data engineering (ICDE), IEEE, pp 821\u2013832","DOI":"10.1109\/ICDE.2017.132"},{"issue":"3","key":"389_CR8","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1145\/2815493.2815499","volume":"2","author":"K Chatzikokolakis","year":"2015","unstructured":"Chatzikokolakis K, Palamidessi C, Stronati M (2015) Location privacy via geo-indistinguishability. ACM SIGLOG News 2(3):46\u201369. https:\/\/doi.org\/10.1145\/2815493.2815499","journal-title":"ACM SIGLOG News"},{"issue":"4","key":"389_CR9","doi-asserted-by":"publisher","first-page":"24:1","DOI":"10.1145\/1620585.1620591","volume":"34","author":"CY Chow","year":"2009","unstructured":"Chow CY, Mokbel MF, Aref WG (2009) Casper*: Query processing for location services without compromising privacy. ACM Trans Database Syst 34(4):24:1\u201324:48. https:\/\/doi.org\/10.1145\/1620585.1620591","journal-title":"ACM Trans Database Syst"},{"key":"389_CR10","doi-asserted-by":"crossref","unstructured":"Cornelius C, Kapadia A, Kotz D, Peebles D, Shin M, Triandopoulos N (2008) AnonySense: Privacy-aware people-centric sensing. In: MobiSys","DOI":"10.1145\/1378600.1378624"},{"issue":"4","key":"389_CR11","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1007\/s10707-014-0205-7","volume":"18","author":"ML Damiani","year":"2014","unstructured":"Damiani M L (2014) Location privacy models in mobile applications: conceptual view and research directions. GeoInformatica 18(4):819\u2013842","journal-title":"GeoInformatica"},{"issue":"2","key":"389_CR12","first-page":"123","volume":"3","author":"ML Damiani","year":"2010","unstructured":"Damiani ML, Bertino E, Silvestri C (2010) The probe framework for the personalized cloaking of private locations. Trans Data Privacy 3(2):123\u2013148. http:\/\/dl.acm.org\/citation.cfm?id=1824401.1824404","journal-title":"Trans Data Privacy"},{"issue":"5","key":"389_CR13","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1016\/j.pmcj.2012.09.002","volume":"9","author":"E D\u2019Hondta","year":"2013","unstructured":"D\u2019Hondta E, Stevens M, Jacobs A (2013) Participatory noise mapping works! an evaluation of participatory sensing as an alternative to standard techniques for environmental monitoring. Pervasive and Mobile Computing 9(5):681\u2013694","journal-title":"Pervasive and Mobile Computing"},{"key":"389_CR14","doi-asserted-by":"crossref","unstructured":"Douceur JR (2002) The sybil attack. In: Revised papers from the 1st international workshop on peer-to-peer systems, IPTPS \u201901. Springer-Verlag, London, pp 251\u2013260. http:\/\/dl.acm.org\/citation.cfm?id=646334.687813","DOI":"10.1007\/3-540-45748-8_24"},{"key":"389_CR15","doi-asserted-by":"crossref","unstructured":"Drosatos G, Efraimidis PS, Athanasiadis IN, Stevens M (2012) A privacy-preserving cloud computing system for creating participatory noise maps. In: COMPSAC, pp 581\u2013586","DOI":"10.1109\/COMPSAC.2012.78"},{"issue":"2","key":"389_CR16","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/2076450.2076470","volume":"55","author":"M Faezipour","year":"2012","unstructured":"Faezipour M, Nourani M, Saeed A, Addepalli S (2012) Progress and challenges in intelligent vehicle area networks. Magazine Communications of the ACM 55(2):90\u2013100","journal-title":"Magazine Communications of the ACM"},{"key":"389_CR17","doi-asserted-by":"crossref","unstructured":"Ganti R K, Pham N, Tsai Y E, Abdelzaher T F (2008) PoolView: Stream privacy for grassroots participatory sensing. In: SenSys","DOI":"10.1145\/1460412.1460440"},{"issue":"2","key":"389_CR18","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/COMST.2014.2387836","volume":"17","author":"H Gao","year":"2015","unstructured":"Gao H, Liu C H, Wang W, Zhao J, Song Z, Su X, Crowcroft J, Leung K K (2015) A survey of incentive mechanisms for participatory sensing. IEEE Comm Surveys and Tutorials 17(2):918\u2013943","journal-title":"IEEE Comm Surveys and Tutorials"},{"issue":"2","key":"389_CR19","doi-asserted-by":"publisher","first-page":"8:1","DOI":"10.1145\/2910580","volume":"2","author":"G Ghinita","year":"2016","unstructured":"Ghinita G, Damiani ML, Silvestri C, Bertino E (2016) Protecting against velocity-based, proximity-based, and external event attacks in location-centric social networks. ACM Trans Spatial Algorithms Syst 2(2):8:1\u20138:36. https:\/\/doi.org\/10.1145\/2910580","journal-title":"ACM Trans Spatial Algorithms Syst"},{"issue":"1","key":"389_CR20","doi-asserted-by":"publisher","first-page":"4:1","DOI":"10.1145\/2845080","volume":"2","author":"P Goel","year":"2016","unstructured":"Goel P, Kulik L, Ramamohanarao K (2016) Privacy-aware dynamic ride sharing. ACM Trans Spatial Algorithms Syst 2(1):4:1\u20134:41. https:\/\/doi.org\/10.1145\/2845080","journal-title":"ACM Trans Spatial Algorithms Syst"},{"key":"389_CR21","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez J, H\u00f6lzl M, Riedl P, Bonnet P, Mayrhofer R (2014) A practical hardware-assisted approach to customize trusted boot for mobile devices. In: Chow SSM, Camenisch J, Hui L C K, Yiu S M (eds) Information Security. Springer International Publishing, pp 542\u2013554","DOI":"10.1007\/978-3-319-13257-0_35"},{"issue":"5","key":"389_CR22","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/TMC.2011.116","volume":"11","author":"B Hoh","year":"2012","unstructured":"Hoh B, Iwuchukwu T, Jacobson Q, Work D, Bayen A M, Herring R, Herrera J C, Gruteser M, Annavaram M, Ban J (2012) Enhancing privacy and accuracy in probe vehicle-based traffic monitoring via virtual trip lines. IEEE Tran on Mobile Computing 11(5):849\u2013864","journal-title":"IEEE Tran on Mobile Computing"},{"issue":"11","key":"389_CR23","doi-asserted-by":"publisher","first-page":"1266","DOI":"10.1016\/j.comcom.2009.08.012","volume":"33","author":"KL Huang","year":"2010","unstructured":"Huang KL, Kanhere SS, Hu W (2010) Preserving privacy in participatory sensing systems. Comput Commun 33(11):1266\u20131280. https:\/\/doi.org\/10.1016\/j.comcom.2009.08.012","journal-title":"Comput Commun"},{"issue":"2","key":"389_CR24","first-page":"1379","volume":"1","author":"N Jain","year":"2008","unstructured":"Jain N, Mishra S, Srinivasan A, Gehrke J, Widom J, Balakrishnan H, \u00c7etintemel U, Cherniack M, Tibbetts R, Zdonik S B (2008) Towards a streaming sql standard. PVLDB 1(2):1379\u20131390","journal-title":"PVLDB"},{"key":"389_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.is.2017.09.003","volume":"72","author":"S Lallali","year":"2017","unstructured":"Lallali S, Anciaux N, Popa IS, Pucheral P (2017) Supporting secure keyword search in the personal cloud. Inf Syst 72:1\u201326. https:\/\/doi.org\/10.1016\/j.is.2017.09.003. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0306437916303891","journal-title":"Inf Syst"},{"issue":"C","key":"389_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.03.015","volume":"400","author":"M Li","year":"2017","unstructured":"Li M, Zhu L, Zhang Z, Xu R (2017) Achieving differential privacy of trajectory data publishing in participatory sensing. Inf Sci 400(C):1\u201313 . https:\/\/doi.org\/10.1016\/j.ins.2017.03.015","journal-title":"Inf Sci"},{"key":"389_CR27","doi-asserted-by":"crossref","unstructured":"Li Q, Cao G (2012) Efficient and privacy-preserving data aggregation in mobile sensing. In: IEEE ICNP","DOI":"10.1109\/ICNP.2012.6459985"},{"key":"389_CR28","doi-asserted-by":"publisher","unstructured":"Liu R, Cao J, VanSyckel S, Gao W (2016) Prime: Human-centric privacy measurement based on user preferences towards data sharing in mobile participatory sensing systems. In: 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp 1\u20138. https:\/\/doi.org\/10.1109\/PERCOM.2016.7456518","DOI":"10.1109\/PERCOM.2016.7456518"},{"issue":"4","key":"389_CR29","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1007\/s10707-017-0304-3","volume":"21","author":"M Maruseac","year":"2017","unstructured":"Maruseac M, Ghinita G, Trajcevski G, Scheuermann P (2017) Privacy-preserving detection of anomalous phenomena in crowdsourced environmental sensing using fine-grained weighted voting. Geoinformatica 21(4):733\u2013762. https:\/\/doi.org\/10.1007\/s10707-017-0304-3","journal-title":"Geoinformatica"},{"key":"389_CR30","doi-asserted-by":"crossref","unstructured":"de Montjoye Y A, Hidalgo C A, Verleysen M, Blondel V D (2013) Unique in the crowd: The privacy bounds of human mobility. Scientific reports 3","DOI":"10.1038\/srep01376"},{"key":"389_CR31","doi-asserted-by":"crossref","unstructured":"Nittel S, Whittier JC, Liang Q (2012) Real-time spatial interpolation of continuous phenomena using mobile sensor data streams. In: ACM SIGSPATIAL, pp 530\u2013533","DOI":"10.1145\/2424321.2424407"},{"issue":"1","key":"389_CR32","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/TMC.2016.2538226","volume":"16","author":"J Pan","year":"2017","unstructured":"Pan J, Sandu-Popa I, Borcea C (2017) Divert: A distributed vehicular traffic re-routing system for congestion avoidance. IEEE Trans Mob Comput 16(1):58\u201372. https:\/\/doi.org\/10.1109\/TMC.2016.2538226","journal-title":"IEEE Trans Mob Comput"},{"key":"389_CR33","doi-asserted-by":"crossref","unstructured":"Penza M (2014) Cost action TD1105: New sensing technologies for environmental sustainability in smart cities. In: IEEE SENSORS","DOI":"10.1109\/ICSENS.2014.6984918"},{"key":"389_CR34","doi-asserted-by":"crossref","unstructured":"Piro C, Shields C, Levine BN (2006) Detecting the sybil attack in mobile ad hoc networks. In: 2006 Securecomm and Workshops, pp 1\u201311","DOI":"10.1109\/SECCOMW.2006.359558"},{"key":"389_CR35","doi-asserted-by":"crossref","unstructured":"Popa RA, Blumberg AJ, Balakrishnan H, Li FH (2011) Privacy and accountability for location-based aggregate statistics. In: CCS, pp 653\u2013666","DOI":"10.1145\/2046707.2046781"},{"key":"389_CR36","doi-asserted-by":"crossref","unstructured":"Priebe C, Vaswani K, Costa M (2018) Enclavedb - a secure database using sgx. IEEE. https:\/\/www.microsoft.com\/en-us\/research\/publication\/enclavedb-a-secure-database-using-sgx\/","DOI":"10.1109\/SP.2018.00025"},{"key":"389_CR37","doi-asserted-by":"crossref","unstructured":"Quercia D, Leontiadis I, Mcnamara L, Mascolo C, Crowcroft J (2011) Spotme if you can: Randomized responses for location obfuscation on mobile phones. In: ICDCS, pp 363\u2013372","DOI":"10.1109\/ICDCS.2011.79"},{"key":"389_CR38","doi-asserted-by":"publisher","unstructured":"Sabt M, Achemlal M, Bouabdallah A (2015) Trusted execution environment: What it is, and what it is not. In: 2015 IEEE trustcom\/BigDataSE\/ISPA. https:\/\/doi.org\/10.1109\/Trustcom.2015.357, vol 1, pp 57\u201364","DOI":"10.1109\/Trustcom.2015.357"},{"key":"389_CR39","doi-asserted-by":"crossref","unstructured":"Shi J, Zhang R, Liu Y, Zhang Y (2010) PriSense: Privacy-preserving data aggregation in people-centric urban sensing systems. In: IEEE INFOCOM","DOI":"10.1109\/INFCOM.2010.5462147"},{"key":"389_CR40","doi-asserted-by":"crossref","unstructured":"Thiagarajan A, Ravindranath L, LaCurts K, Madden S, Balakrishnan H, Toledo S, Eriksson J (2009) Vtrack: accurate, energy-aware road traffic delay estimation using mobile phones. In: ACM SenSys, pp 85\u201398","DOI":"10.1145\/1644038.1644048"},{"key":"389_CR41","unstructured":"To QC, Nguyen B, Pucheral P (2014) Privacy-preserving query execution using a decentralized architecture and tamper resistant hardware. In: EDBT, pp 487\u2013498"},{"issue":"3","key":"389_CR42","doi-asserted-by":"publisher","first-page":"16:1","DOI":"10.1145\/2894750","volume":"41","author":"QC To","year":"2016","unstructured":"To QC, Nguyen B, Pucheral P (2016) Private and scalable execution of sql aggregates on a secure decentralized architecture. ACM Trans Database Syst 41 (3):16:1\u201316:43. https:\/\/doi.org\/10.1145\/2894750","journal-title":"ACM Trans Database Syst"},{"key":"389_CR43","doi-asserted-by":"crossref","unstructured":"Ton-That D H, Sandu-Popa I, Zeitouni K (2015) PPTM: Privacy-aware participatory traffic monitoring using mobile secure probes. In: IEEE MDM, demo paper","DOI":"10.1109\/MDM.2015.19"},{"key":"389_CR44","doi-asserted-by":"publisher","unstructured":"Ton-That DH, Sandu-Popa I, Zeitouni K, Borcea C (2016) PAMPAS: Privacy-aware mobile participatory sensing using secure probes. In: Proceedings of the 28th international conference on scientific and statistical database management, ACM, SSDBM \u201916, pp 4:1\u20134:12. https:\/\/doi.org\/10.1145\/2949689.2949704","DOI":"10.1145\/2949689.2949704"},{"key":"389_CR45","doi-asserted-by":"publisher","unstructured":"Wang G, Wang B, Wang T, Nika A, Zheng H, Zhao BY (2016) Defending against sybil devices in crowdsourced mapping services. In: Proceedings of the 14th annual international conference on mobile systems, applications, and services, MobiSys \u201916. ACM, New York, pp 179\u2013191. https:\/\/doi.org\/10.1145\/2906388.2906420","DOI":"10.1145\/2906388.2906420"},{"key":"389_CR46","doi-asserted-by":"publisher","unstructured":"Wang L, Yang D, Han X, Wang T, Zhang D, Ma X (2017) Location privacy-preserving task allocation for mobile crowdsensing with differential geo-obfuscation. In: Proceedings of the 26th international conference on World Wide Web, international world wide web conferences steering committee, Republic and Canton of Geneva, Switzerland, WWW \u201917, pp 627\u2013636. https:\/\/doi.org\/10.1145\/3038912.3052696","DOI":"10.1145\/3038912.3052696"},{"key":"389_CR47","doi-asserted-by":"crossref","unstructured":"Yuan J, Zheng Y, Xie W, Xie X, Sun G, Huang Y (2010) T-drive: driving directions based on taxi trajectories. In: SIGSPATIAL, pp 99\u2013108","DOI":"10.1145\/1869790.1869807"}],"container-title":["GeoInformatica"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-019-00389-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10707-019-00389-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-019-00389-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T07:13:24Z","timestamp":1627370004000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10707-019-00389-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,20]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["389"],"URL":"https:\/\/doi.org\/10.1007\/s10707-019-00389-4","relation":{},"ISSN":["1384-6175","1573-7624"],"issn-type":[{"type":"print","value":"1384-6175"},{"type":"electronic","value":"1573-7624"}],"subject":[],"published":{"date-parts":[[2019,12,20]]},"assertion":[{"value":"31 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}