Location privacy-preserving mechanisms in location-based services: A comprehensive survey

H Jiang, J Li, P Zhao, F Zeng, Z Xiao… - ACM Computing Surveys …, 2021 - dl.acm.org
… system and subsequently discuss location privacy concerns, the … Afterwards, we identify the
objectives of location privacy … level of location privacy may require sacrificing service quality. …

A novel privacy protection scheme for location-based services using collaborative caching

N Nisha, I Natgunanathan, S Gao, Y Xiang - Computer Networks, 2022 - Elsevier
… effective location privacy protection mechanism (LPPM) for LBSs without compromising the
quality of service. … In our proposed GCS, a querying user must be authenticated by the other …

P2LBS: Privacy provisioning in location-based services

VK Yadav, N Andola, S Verma… - … on Services Computing, 2021 - ieeexplore.ieee.org
authentication of the server before making the payment is also necessary. Organization:
Section 2 describes the literature review of the location-based services … is compromised with the …

[HTML][HTML] User location privacy protection mechanism for location-based services

Y He, J Chen - Digital communications and networks, 2021 - Elsevier
authentication security of the system and then design a new location privacy protection
mechanism based on the privacywithout compromising their privacy [16]. Another definition of …

Resilient privacy protection for location-based services through decentralization

H Jin, P Papadimitratos - ACM Transactions on Privacy and Security …, 2019 - dl.acm.org
… are: (1) use of pseudonymous authentication for privacypreserving user authentication, (2) …
Without loss of generality, we assume that POI data in the LBS server is updated every TPOI , …

Linkable privacy-preserving scheme for location-based services

VK Yadav, S Verma… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
location privacy, query content privacy, POI privacy and allows linking of query instances from
the same returning user without sacrificing … , location privacy, and authentication of the user…

Desynchronization resistant privacy preserving user authentication protocol for location based services

PK Roy, A Bhattacharya - Peer-to-Peer Networking and Applications, 2021 - Springer
… user privacy and authenticity are essential requirements for location based services in order
… and provide secure access to various services. Recently, numerous approaches towards …

LPPA: Lightweight privacy-preserving authentication from efficient multi-key secure outsourced computation for location-based services in VANETs

J Zhou, Z Cao, Z Qin, X Dong… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… message authentication code, … without compromising the underlying security and privacy
requirements. However, to resist replay attack, it is required in [4] that the private authentication

A novel privacy-preserving location-based services search scheme in outsourced cloud

D Li, J Wu, J Le, X Liao, T Xiang - IEEE Transactions on Cloud …, 2021 - ieeexplore.ieee.org
… infer the user’s location privacy and query privacy based on the … to construct an identity
authentication scheme between the … achieve privacy-preserving location-based services search …

Efficient privacy-preserving scheme for location based services in VANET system

F Farouk, Y Alkady, R Rizk - IEEE Access, 2020 - ieeexplore.ieee.org
… a Registration authority (RA) is used to provide authentication and authorization services to
the … Once the TTP compromises, all privacy will be leaked because the TTP knows all the real …