A Control-Theoretic Approach for Location Privacy in Mobile Applications
Title | A Control-Theoretic Approach for Location Privacy in Mobile Applications |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Cerf, Sophie, Robu, Bogdan, Marchand, Nicolas, Mokhtar, Sonia Ben, Bouchenak, Sara |
Conference Name | 2018 IEEE Conference on Control Technology and Applications (CCTA) |
Date Published | Aug. 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-7698-1 |
Keywords | Computing Theory and Privacy, control formulation, control signals, control theory, control-based approach, control-theoretic approach, Cyber physical system, cyber physical systems, Data models, data privacy, Dispersion, dynamic modeling, Human Behavior, literature focus, location information, location privacy, Meters, mobile applications, mobile computing, mobility records simulation, PI control, PI control strategy, POI-related privacy measure, privacy, privacy issues, protection algorithm, pubcrawl, resilience, Resiliency, Scalability, users mobility pattern |
Abstract | The prevalent use of mobile applications using location information to improve the quality of their service has arisen privacy issues, particularly regarding the extraction of user's points on interest. Many studies in the literature focus on presenting algorithms that allow to protect the user of such applications. However, these solutions often require a high level of expertise to be understood and tuned properly. In this paper, the first control-based approach of this problem is presented. The protection algorithm is considered as the ``physical'' plant and its parameters as control signals that enable to guarantee privacy despite user's mobility pattern. The following of the paper presents the first control formulation of POI-related privacy measure, as well as dynamic modeling and a simple yet efficient PI control strategy. The evaluation using simulated mobility records shows the relevance and efficiency of the presented approach. |
URL | https://ieeexplore.ieee.org/document/8511409 |
DOI | 10.1109/CCTA.2018.8511409 |
Citation Key | cerf_control-theoretic_2018 |
- location privacy
- users mobility pattern
- Scalability
- Resiliency
- resilience
- pubcrawl
- protection algorithm
- privacy issues
- privacy
- POI-related privacy measure
- PI control strategy
- PI control
- mobility records simulation
- mobile computing
- Mobile Applications
- Meters
- Computing Theory and Privacy
- location information
- literature focus
- Human behavior
- dynamic modeling
- dispersion
- data privacy
- Data models
- cyber physical systems
- Cyber Physical System
- control-theoretic approach
- control-based approach
- Control Theory
- control signals
- control formulation