Demonstration of Location Privacy Enforcement using Obfuscation
Romulo Meira Goes, Sanjit Seshia, Stephane Lafortune, Gregory Willett, Nicholas Recker, Blake Rawlings, Christoforos Keroglou

Citation
Romulo Meira Goes, Sanjit Seshia, Stephane Lafortune, Gregory Willett, Nicholas Recker, Blake Rawlings, Christoforos Keroglou. "Demonstration of Location Privacy Enforcement using Obfuscation". Talk or presentation, 11, October, 2017; Poster presented at the 2017 TerraSwarm Annual Meeting.

Abstract
This poster describes the demonstration of the enforcement of secret locations for a user moving around the first floor of the Clark Kerr Conference Center. The obfuscation strategy is first calculated using an algorithm described in publication P091126 for a grid model of the first floor, and under the specified budget and utility constraints. At run-time, the AALPS system is used to record the exact location of the agent on the grid, which is then written in the GDP. The obfuscator reads this position from the GDP and uses the pre-synthesized solution to select one valid move for the obfuscated agent. This move is then recorded in the GDP for public disclosure.

Electronic downloads


Internal. This publication has been marked by the author for TerraSwarm-only distribution, so electronic downloads are not available without logging in.
Citation formats  
  • HTML
    Romulo Meira Goes, Sanjit Seshia, Stephane Lafortune,
    Gregory Willett, Nicholas Recker, Blake Rawlings,
    Christoforos Keroglou. <a
    href="http://www.terraswarm.org/pubs/1014.html"><i>Demonstration
    of Location Privacy Enforcement using
    Obfuscation</i></a>, Talk or presentation,  11,
    October, 2017; Poster presented at the <a
    href="http://terraswarm.org/conferences/17/annual"
    >2017 TerraSwarm Annual Meeting</a>.
  • Plain text
    Romulo Meira Goes, Sanjit Seshia, Stephane Lafortune,
    Gregory Willett, Nicholas Recker, Blake Rawlings,
    Christoforos Keroglou. "Demonstration of Location
    Privacy Enforcement using Obfuscation". Talk or
    presentation,  11, October, 2017; Poster presented at the
    <a
    href="http://terraswarm.org/conferences/17/annual"
    >2017 TerraSwarm Annual Meeting</a>.
  • BibTeX
    @presentation{MeiraGoesSeshiaLafortuneWillettReckerRawlingsKeroglou17_DemonstrationOfLocationPrivacyEnforcementUsingObfuscation,
        author = {Romulo Meira Goes and Sanjit Seshia and Stephane
                  Lafortune and Gregory Willett and Nicholas Recker
                  and Blake Rawlings and Christoforos Keroglou},
        title = {Demonstration of Location Privacy Enforcement
                  using Obfuscation},
        day = {11},
        month = {October},
        year = {2017},
        note = {Poster presented at the <a
                  href="http://terraswarm.org/conferences/17/annual"
                  >2017 TerraSwarm Annual Meeting</a>.},
        abstract = {This poster describes the demonstration of the
                  enforcement of secret locations for a user moving
                  around the first floor of the Clark Kerr
                  Conference Center. The obfuscation strategy is
                  first calculated using an algorithm described in
                  publication P091126 for a grid model of the first
                  floor, and under the specified budget and utility
                  constraints. At run-time, the AALPS system is used
                  to record the exact location of the agent on the
                  grid, which is then written in the GDP. The
                  obfuscator reads this position from the GDP and
                  uses the pre-synthesized solution to select one
                  valid move for the obfuscated agent. This move is
                  then recorded in the GDP for public disclosure.},
        URL = {http://terraswarm.org/pubs/1014.html}
    }
    

Posted by Stephane Lafortune on 12 Oct 2017.
Groups: services

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.