{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T16:28:58Z","timestamp":1721838538441},"reference-count":66,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"2","license":[{"start":{"date-parts":[[2017,4,1]],"date-time":"2017-04-01T00:00:00Z","timestamp":1491004800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4,1]]},"abstract":"Abstract<\/jats:title>\n In the past few years, we have witnessed a rise in the popularity of ride-hailing services (RHSs), an online marketplace that enables accredited drivers to use their own cars to drive ride-hailing users. Unlike other transportation services, RHSs raise significant privacy concerns, as providers are able to track the precise mobility patterns of millions of riders worldwide. We present the first survey and analysis of the privacy threats in RHSs. Our analysis exposes high-risk privacy threats that do not occur in conventional taxi services. Therefore, we propose PrivateRide, a privacy-enhancing and practical solution that offers anonymity and location privacy for riders, and protects drivers\u2019 information from harvesting attacks. PrivateRide lowers the high-risk privacy threats in RHSs to a level that is at least as low as that of many taxi services. Using real data-sets from Uber and taxi rides, we show that PrivateRide significantly enhances riders\u2019 privacy, while preserving tangible accuracy in ride matching and fare calculation, with only negligible effects on convenience. Moreover, by using our Android implementation for experimental evaluations, we show that PrivateRide\u2019s overhead during ride setup is negligible. In short, we enable privacy-conscious riders to achieve levels of privacy that are not possible in current RHSs and even in some conventional taxi services, thereby offering a potential business differentiator.<\/jats:p>","DOI":"10.1515\/popets-2017-0015","type":"journal-article","created":{"date-parts":[[2017,4,6]],"date-time":"2017-04-06T10:04:34Z","timestamp":1491473074000},"page":"38-56","source":"Crossref","is-referenced-by-count":74,"title":["PrivateRide: A Privacy-Enhanced Ride-Hailing Service"],"prefix":"10.56553","volume":"2017","author":[{"given":"Anh","family":"Pham","sequence":"first","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Italo","family":"Dacosta","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Bastien","family":"Jacot-Guillarmod","sequence":"additional","affiliation":[{"name":"Google. This work was carried out while the author was with EPFL, Lausanne, Switzerland ."}]},{"given":"K\u00e9vin","family":"Huguenin","sequence":"additional","affiliation":[{"name":"University of Lausanne, Lausanne, Switzerland"}]},{"given":"Taha","family":"Hajar","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Florian","family":"Tram\u00e8r","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, United States of America . This work was carried out while the author was with EPFL, Lausanne, Switzerland ."}]},{"given":"Virgil","family":"Gligor","sequence":"additional","affiliation":[{"name":"CMU, Pittsburgh, United States of America"}]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[{"name":"Jean-Pierre Hubaux: EPFL, Lausanne, Switzerland"}]}],"member":"35752","published-online":{"date-parts":[[2017,4,4]]},"reference":[{"key":"2021040703355277273_j_popets-2017-0015_ref_001_w2aab2b8c17b1b7b1ab1ab1Aa","unstructured":"[1] http:\/\/rideshareapps.com\/2015-rideshare-infographic\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_002_w2aab2b8c17b1b7b1ab1ab2Aa","unstructured":"[2] http:\/\/www.dailydot.com\/technology\/uber-female-driver-harassment\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_003_w2aab2b8c17b1b7b1ab1ab3Aa","unstructured":"[3] http:\/\/www.reuters.com\/article\/uber-tech-lyft-probe-exclusive-idUSKBN0U12FH20151219. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_004_w2aab2b8c17b1b7b1ab1ab4Aa","unstructured":"[4] http:\/\/www.bbc.com\/news\/business-35888352. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_005_w2aab2b8c17b1b7b1ab1ab5Aa","unstructured":"[5] http:\/\/www.engadget.com\/2015\/03\/18\/uber-outnumbers-taxis-in-nyc\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_006_w2aab2b8c17b1b7b1ab1ab6Aa","unstructured":"[6] https:\/\/github.com\/gdanezis\/petlib. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_007_w2aab2b8c17b1b7b1ab1ab7Aa","unstructured":"[7] http:\/\/www.businessinsider.com\/blake-jareds-50000-uber-credit-free-rides-for-life-2014-4. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_008_w2aab2b8c17b1b7b1ab1ab8Aa","unstructured":"[8] http:\/\/fortune.com\/2015\/03\/30\/uber-stolen-account-credentials-alphabay\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_009_w2aab2b8c17b1b7b1ab1ab9Aa","unstructured":"[9] Cryptographic key length recommendation. http:\/\/www.keylength.com\/en\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_010_w2aab2b8c17b1b7b1ab1ac10Aa","doi-asserted-by":"crossref","unstructured":"[10] G. Arfaoui, J.-F. Lalande, J. Traor\u00e9, N. Desmoulins, P. Berthom\u00e9, and S. Gharout. A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. Proc. of the 15th Privacy Enhancing Technologies Symposium, 2015.","DOI":"10.1515\/popets-2015-0019"},{"key":"2021040703355277273_j_popets-2017-0015_ref_011_w2aab2b8c17b1b7b1ab1ac11Aa","unstructured":"[11] Y. Aumann and Y. Lindell. Security against covert adversaries: Efficient protocols for realistic adversaries. In Theory of cryptography. Springer, 2007."},{"key":"2021040703355277273_j_popets-2017-0015_ref_012_w2aab2b8c17b1b7b1ab1ac12Aa","unstructured":"[12] J. Balasch, A. Rial, C. Troncoso, B. Preneel, I. Verbauwhede, and C. Geuens. PrETP: Privacy-Preserving Electronic Toll Pricing. In Proc. of USENIX Security Symposium, 2010."},{"key":"2021040703355277273_j_popets-2017-0015_ref_013_w2aab2b8c17b1b7b1ab1ac13Aa","doi-asserted-by":"crossref","unstructured":"[13] F. Baldimtsi and A. Lysyanskaya. Anonymous credentials light. In Proc. of the 2013 ACM SIGSAC conference on Computer & communications security, 2013.","DOI":"10.1145\/2508859.2516687"},{"key":"2021040703355277273_j_popets-2017-0015_ref_014_w2aab2b8c17b1b7b1ab1ac14Aa","unstructured":"[14] http:\/\/www.bloomberg.com\/news\/articles\/2015-06-28\/one-driver-explains-how-he-is-helping-to-rip-off-uber-in-china. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_015_w2aab2b8c17b1b7b1ab1ac15Aa","unstructured":"[15] www.bostonglobe.com\/business\/2015\/01\/13\/uber-share-ridership-data-with-boston\/4Klo40KZREtQ7jkoaZjoNN\/story.html. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_016_w2aab2b8c17b1b7b1ab1ac16Aa","unstructured":"[16] S. Brands. Electronic cash systems based on the representation problem in groups of prime order. Proc. of the 13th Cryptology Conference, 1993."},{"key":"2021040703355277273_j_popets-2017-0015_ref_017_w2aab2b8c17b1b7b1ab1ac17Aa","doi-asserted-by":"crossref","unstructured":"[17] J. Camenisch, J. Piveteau, and M. Stadler. An efficient payment system protecting privacy. Proc. of the 9th European Symposium on Research in Computer Security, 1994.","DOI":"10.1007\/3-540-58618-0_65"},{"key":"2021040703355277273_j_popets-2017-0015_ref_018_w2aab2b8c17b1b7b1ab1ac18Aa","unstructured":"[18] https:\/\/newsroom.uber.com\/updated-cancellation-policy\/. Last visited: Nov. 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_019_w2aab2b8c17b1b7b1ab1ac19Aa","unstructured":"[19] R. Canetti. Studies in secure multiparty computation and applications. PhD thesis, The Weizmann Institute of Science, 1996."},{"key":"2021040703355277273_j_popets-2017-0015_ref_020_w2aab2b8c17b1b7b1ab1ac20Aa","doi-asserted-by":"crossref","unstructured":"[20] D. Chaum. Blind signatures for untraceable payments. In Proc. of the 3rd Cryptology Conference, 1983.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"2021040703355277273_j_popets-2017-0015_ref_021_w2aab2b8c17b1b7b1ab1ac21Aa","doi-asserted-by":"crossref","unstructured":"[21] D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In Proc. of the 10th Cryptology Conference, 1990.","DOI":"10.1007\/0-387-34799-2_25"},{"key":"2021040703355277273_j_popets-2017-0015_ref_022_w2aab2b8c17b1b7b1ab1ac22Aa","doi-asserted-by":"crossref","unstructured":"[22] L. Chen, A. Mislove, and C. Wilson. Peeking Beneath the Hood of Uber. In Proc. of the ACM Conference on Internet Measurement Conference. ACM, 2015.","DOI":"10.1145\/2815675.2815681"},{"key":"2021040703355277273_j_popets-2017-0015_ref_023_w2aab2b8c17b1b7b1ab1ac23Aa","unstructured":"[23] http:\/\/www.cnet.com\/news\/taxi-dispute-gets-physical-in-france-with-attack-on-uber-car\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_024_w2aab2b8c17b1b7b1ab1ac24Aa","unstructured":"[24] https:\/\/developer.android.com\/tools\/sdk\/ndk\/index.html. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_025_w2aab2b8c17b1b7b1ab1ac25Aa","unstructured":"[25] http:\/\/nypost.com\/2016\/09\/10\/fake-uber-drivers-are-scamming-tourists-at-us-open\/. Last visited: Nov. 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_026_w2aab2b8c17b1b7b1ab1ac26Aa","unstructured":"[26] http:\/\/flask.pocoo.org\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_027_w2aab2b8c17b1b7b1ab1ac27Aa","unstructured":"[27] http:\/\/www.forbes.com\/sites\/kashmirhill\/2014\/10\/03\/god-view-uber-allegedly-stalked-users-for-party-goers-viewing-pleasure\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_028_w2aab2b8c17b1b7b1ab1ac28Aa","unstructured":"[28] www.forbes.com\/sites\/ellenhuet\/2014\/09\/08\/uber-lyft-cars-arrive-faster-than-taxis\/#3f819c3c5f73. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_029_w2aab2b8c17b1b7b1ab1ac29Aa","unstructured":"[29] http:\/\/www.forbes.com\/sites\/ronhirson\/2015\/03\/23\/uber-the-big-data-company\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_030_w2aab2b8c17b1b7b1ab1ac30Aa","doi-asserted-by":"crossref","unstructured":"[30] J. Friginal, S. Gambs, J. Guiochet, and M.-O. Killijian. Towards privacy-driven design of a dynamic carpooling system. Trans. on Pervasive and Mobile Computing, 2014.","DOI":"10.1016\/j.pmcj.2014.05.009"},{"key":"2021040703355277273_j_popets-2017-0015_ref_031_w2aab2b8c17b1b7b1ab1ac31Aa","unstructured":"[31] https:\/\/gigaom.com\/2014\/11\/21\/if-youre-worried-about-uber-and-privacy-dont-forget-lyft-and-sidecar\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_032_w2aab2b8c17b1b7b1ab1ac32Aa","unstructured":"[32] https:\/\/github.com\/dima42\/uber-gps-analysis\/blob\/master\/gpsdata\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_033_w2aab2b8c17b1b7b1ab1ac33Aa","doi-asserted-by":"crossref","unstructured":"[33] P. Golle and K. Partridge. On the anonymity of home\/work location pairs. In Proc. of the Conference on Pervasive Computing, pages 390\u2013397. Springer, 2009.","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"2021040703355277273_j_popets-2017-0015_ref_034_w2aab2b8c17b1b7b1ab1ac34Aa","doi-asserted-by":"crossref","unstructured":"[34] M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proc. of the 1st international conference on Mobile systems, applications and services. ACM, 2003.","DOI":"10.1145\/1066116.1189037"},{"key":"2021040703355277273_j_popets-2017-0015_ref_035_w2aab2b8c17b1b7b1ab1ac35Aa","unstructured":"[35] http:\/\/www.theguardian.com\/technology\/2015\/may\/23\/us-investigates-phantom-cab-rides-on-british-uber-accounts. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_036_w2aab2b8c17b1b7b1ab1ac36Aa","doi-asserted-by":"crossref","unstructured":"[36] T. S. Heydt-Benjamin, H.-J. Chae, B. Defend, and K. Fu. Privacy for public transportation. In Proc. of the 6th Privacy Enhancing Technologies Symposium, 2006.","DOI":"10.1007\/11957454_1"},{"key":"2021040703355277273_j_popets-2017-0015_ref_037_w2aab2b8c17b1b7b1ab1ac37Aa","doi-asserted-by":"crossref","unstructured":"[37] G. Hinterw\u00e4lder, C. T. Zenger, F. Baldimtsi, A. Lysyanskaya, C. Paar, and W. P. Burleson. Efficient e-cash in practice: NFC-based payments for public transportation systems. In Proc. of the 13th Privacy Enhancing Technologies Symposium, 2013.","DOI":"10.1007\/978-3-642-39077-7_3"},{"key":"2021040703355277273_j_popets-2017-0015_ref_038_w2aab2b8c17b1b7b1ab1ac38Aa","doi-asserted-by":"crossref","unstructured":"[38] A. P. Isern-Dey\u00e0, A. Vives-Guasch, M. Mut-Puigserver, M. Payeras-Capell\u00e0, and J. Castell\u00e0-Roca. A secure automatic fare collection system for time-based or distance-based services with revocable anonymity for users. The Computer Journal, 2013.","DOI":"10.1093\/comjnl\/bxs033"},{"key":"2021040703355277273_j_popets-2017-0015_ref_039_w2aab2b8c17b1b7b1ab1ac39Aa","unstructured":"[39] http:\/\/jetsettershomestead.boardingarea.com\/2015\/01\/08\/ways-passengers-can-cheat-uber\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_040_w2aab2b8c17b1b7b1ab1ac40Aa","doi-asserted-by":"crossref","unstructured":"[40] M. Li, N. Cao, S. Yu, and W. Lou. Findu: Privacy-preserving personal profile matching in mobile social networks. In Proc. of the Conference on Computer Communications. IEEE, 2011.","DOI":"10.1109\/INFCOM.2011.5935065"},{"key":"2021040703355277273_j_popets-2017-0015_ref_041_w2aab2b8c17b1b7b1ab1ac41Aa","unstructured":"[41] S. Meiklejohn, K. Mowery, S. Checkoway, and H. Shacham. The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion. In Proc. of the 20th USENIX Security Symposium, 2011."},{"key":"2021040703355277273_j_popets-2017-0015_ref_042_w2aab2b8c17b1b7b1ab1ac42Aa","unstructured":"[42] http:\/\/money.cnn.com\/2014\/08\/11\/technology\/uber-fake-ride-requests-lyft\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_043_w2aab2b8c17b1b7b1ab1ac43Aa","unstructured":"[43] P. Murphy, E. Welsh, and J. P. Frantz. Using bluetooth for short-term ad hoc connections between moving vehicles: a feasibility study. In Vehicular Technology Conference, 2002. VTC Spring 2002. IEEE 55th, volume 1, pages 414\u2013418. IEEE, 2002."},{"key":"2021040703355277273_j_popets-2017-0015_ref_044_w2aab2b8c17b1b7b1ab1ac44Aa","doi-asserted-by":"crossref","unstructured":"[44] M. Naveed, S. Kamara, and C. V. Wright. Inference attacks on property-preserving encrypted databases. In Proc. of the ACM Conference on Computer and Communications Security, 2015.","DOI":"10.1145\/2810103.2813651"},{"key":"2021040703355277273_j_popets-2017-0015_ref_045_w2aab2b8c17b1b7b1ab1ac45Aa","unstructured":"[45] http:\/\/newsroom.uber.com\/2014\/09\/inferring-uber-rider-destinations\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_046_w2aab2b8c17b1b7b1ab1ac46Aa","unstructured":"[46] https:\/\/news.yahoo.com\/warning-uber-account-might-sale-black-market-164144470.html. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_047_w2aab2b8c17b1b7b1ab1ac47Aa","unstructured":"[47] http:\/\/www.newsweek.com\/uber-taxi-e-hailing-riding-app-travis-kalanick-emil-michael-josh-mohrer-uber-285642. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_048_w2aab2b8c17b1b7b1ab1ac48Aa","unstructured":"[48] https:\/\/www.olamoney.com\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_049_w2aab2b8c17b1b7b1ab1ac49Aa","unstructured":"[49] http:\/\/www.oregonlive.com\/today\/index.ssf\/2014\/11\/sex_the_single_girl_and_ubers.html. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_050_w2aab2b8c17b1b7b1ab1ac50Aa","unstructured":"[50] www.owasp.org\/index.php\/OWASP_Risk_Rating_Methodology. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_051_w2aab2b8c17b1b7b1ab1ac51Aa","doi-asserted-by":"crossref","unstructured":"[51] A. Pham, K. Huguenin, I. Bilogrevic, and J.-P. Hubaux. Secure and Private Proofs for Location-Based Activity Summaries in Urban Areas. In Proc. of the 16th ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014.","DOI":"10.1145\/2632048.2632064"},{"key":"2021040703355277273_j_popets-2017-0015_ref_052_w2aab2b8c17b1b7b1ab1ac52Aa","unstructured":"[52] R. A. Popa, H. Balakrishnan, and A. J. Blumberg. VPriv: Protecting Privacy in Location-Based Vehicular Services. In Proc. of the 18th USENIX Security Symposium, 2009."},{"key":"2021040703355277273_j_popets-2017-0015_ref_053_w2aab2b8c17b1b7b1ab1ac53Aa","doi-asserted-by":"crossref","unstructured":"[53] R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan. Cryptdb: Protecting confidentiality with encrypted query processing. In Proc. of the ACM Symposium on Operating Systems Principles, 2011.","DOI":"10.1145\/2043556.2043566"},{"key":"2021040703355277273_j_popets-2017-0015_ref_054_w2aab2b8c17b1b7b1ab1ac54Aa","unstructured":"[54] https:\/\/pypi.python.org\/pypi\/pycrypto. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_055_w2aab2b8c17b1b7b1ab1ac55Aa","unstructured":"[55] http:\/\/research.neustar.biz\/2014\/09\/15\/riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_056_w2aab2b8c17b1b7b1ab1ac56Aa","unstructured":"[56] https:\/\/rtyley.github.io\/spongycastle\/."},{"key":"2021040703355277273_j_popets-2017-0015_ref_057_w2aab2b8c17b1b7b1ab1ac57Aa","unstructured":"[57] http:\/\/sfist.com\/2014\/07\/30\/uber_still_illegally_working_sfo_al.php. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_058_w2aab2b8c17b1b7b1ab1ac58Aa","unstructured":"[58] http:\/\/thehub.lyft.com\/blog\/2014\/10\/15\/cancelations-join-acceptance-rate-equation. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_059_w2aab2b8c17b1b7b1ab1ac59Aa","unstructured":"[59] http:\/\/therideshareguy.com\/uber-deactivated-a-bunch-of-drivers-as-an-intimidation-tactic\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_060_w2aab2b8c17b1b7b1ab1ac60Aa","unstructured":"[60] http:\/\/www.thewire.com\/technology\/2014\/08\/uber-accused-of-booking-thousands-of-fake-rides-with-rival-lyft\/375936\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_061_w2aab2b8c17b1b7b1ab1ac61Aa","unstructured":"[61] http:\/\/toddwschneider.com\/posts\/analyzing-1-1-billion-nyc-taxi-and-uber-trips-with-a-vengeance\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_062_w2aab2b8c17b1b7b1ab1ac62Aa","doi-asserted-by":"crossref","unstructured":"[62] C. Troncoso, G. Danezis, E. Kosta, J. Balasch, and B. Preneel. Pripayd: Privacy-friendly pay-as-you-drive insurance. Trans. on Dependable and Secure Computing, (5), 2011.","DOI":"10.1109\/TDSC.2010.71"},{"key":"2021040703355277273_j_popets-2017-0015_ref_063_w2aab2b8c17b1b7b1ab1ac63Aa","unstructured":"[63] https:\/\/uofi.app.box.com\/NYCtaxidata. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_064_w2aab2b8c17b1b7b1ab1ac64Aa","unstructured":"[64] http:\/\/www.usatoday.com\/story\/tech\/2014\/11\/19\/uber-privacy-tracking\/19285481\/. Last visited: May 2016."},{"key":"2021040703355277273_j_popets-2017-0015_ref_065_w2aab2b8c17b1b7b1ab1ac65Aa","unstructured":"[65] M. Wernke, P. Skvortsov, F. D\u00fcrr, and K. Rothermel. A classification of location privacy attacks and approaches. Personal and Ubiquitous Computing, 2014."},{"key":"2021040703355277273_j_popets-2017-0015_ref_066_w2aab2b8c17b1b7b1ab1ac66Aa","unstructured":"[66] http:\/\/wspa.com\/2016\/01\/18\/uber-driver-off-the-job-after-he-charged-for-fake-puke-2\/. Last visited: May 2016."}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/content.sciendo.com\/view\/journals\/popets\/2017\/2\/article-p38.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciendo.com\/article\/10.1515\/popets-2017-0015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T16:29:40Z","timestamp":1658334580000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2017\/popets-2017-0015.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,1]]},"references-count":66,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,4,4]]},"published-print":{"date-parts":[[2017,4,1]]}},"alternative-id":["10.1515\/popets-2017-0015"],"URL":"https:\/\/doi.org\/10.1515\/popets-2017-0015","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,1]]}}}