Lecture

Location Privacy

Description

This lecture covers the toolbox for privacy engineering related to location privacy, including tools for quantifying and mitigating location-related inferences. It explores the challenges of protecting location privacy, the importance of understanding trust assumptions, and practical issues in safeguarding user whereabouts. Various techniques such as homomorphic encryption, k-anonymity, L-diversity, and subsampling are discussed. The lecture also delves into protecting location privacy through perturbation, hiding, generalization, and adding dummies, highlighting the pitfalls of k-anonymity cloaking. Additionally, it addresses the measurement of privacy, the sensitivity of aggregate location data, and the implications of different privacy mechanisms like spatial obfuscation and peer-to-peer cloaking.

About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.