|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Intelligent Location-Privacy Preserving Mechanisms
If you have a question about this talk, please contact Microsoft Research Cambridge Talks Admins.
This event may be recorded and made available internally or externally via http://research.microsoft.com. Microsoft will own the copyright of any recordings made. If you do not wish to have your image/voice recorded please consider this before attending
The widespread use of smart mobile devices has fostered the development of a variety of successful data-sharing mobile applications. The data that users disclose to untrusted entities (for example, through location-based services) exposes aspects of their private life, which is not apparent at first but can be inferred from the revealed data. People are notoriously bad estimators of risks, including privacy risks. Moreover, due to various cognitive biases, lack of enough information, and the complexity of the decision problem, it is difficult for users to make the optimal decision about whether to reveal or obfuscate their information and, if necessary, how to obfuscate it. In this talk, I address the problem of protecting users’ privacy in data-sharing mobile applications, with the focus on location-based services. I propose strategic algorithms and intelligent tools to automatically assess the users’ location-privacy level, and to find the right balance between revealing and hiding their data. I will present the Location-Privacy Meter (LPM) tool, that we developed to quantify location privacy, as well as our work on optimal defense mechanisms against location-inference attacks.
This talk is part of the Microsoft Research Cambridge, public talks series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsInference Group Axonal degeneration and repair: plasticity and stem cells Measuring National Well-Being – what matters to you?
Other talksScience Makers: sensing with chemicals Ellipsoid Localisation Microscopy The outer zone of turbulent boundary layers How long does take to change? A review of the timelines for innovation in the power sector and other technologies and the implications for power market design and policy The construction of extremism in ‘The Trojan Horse’ affair: implications for identity and citizenship Disc Instability is Dead, Long Live Disc Instability