Location privacy-preserving mechanisms in location-based services: A comprehensive survey

H Jiang, J Li, P Zhao, F Zeng, Z Xiao… - ACM Computing Surveys …, 2021 - dl.acm.org
… system and subsequently discuss location privacy concerns, the … Afterwards, we identify the
objectives of location privacy … level of location privacy may require sacrificing service quality. …

A novel privacy protection scheme for location-based services using collaborative caching

N Nisha, I Natgunanathan, S Gao, Y Xiang - Computer Networks, 2022 - Elsevier
… effective location privacy protection mechanism (LPPM) for LBSs without compromising the
quality of service. … In our proposed GCS, a querying user must be authenticated by the other …

P2LBS: Privacy provisioning in location-based services

VK Yadav, N Andola, S Verma… - … on Services Computing, 2021 - ieeexplore.ieee.org
authentication of the server before making the payment is also necessary. Organization:
Section 2 describes the literature review of the location-based services … is compromised with the …

[HTML][HTML] User location privacy protection mechanism for location-based services

Y He, J Chen - Digital communications and networks, 2021 - Elsevier
authentication security of the system and then design a new location privacy protection
mechanism based on the privacywithout compromising their privacy [16]. Another definition of …

Linkable privacy-preserving scheme for location-based services

VK Yadav, S Verma… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
location privacy, query content privacy, POI privacy and allows linking of query instances from
the same returning user without sacrificing … , location privacy, and authentication of the user…

Desynchronization resistant privacy preserving user authentication protocol for location based services

PK Roy, A Bhattacharya - Peer-to-Peer Networking and Applications, 2021 - Springer
… user privacy and authenticity are essential requirements for location based services in order
… and provide secure access to various services. Recently, numerous approaches towards …

A novel privacy-preserving location-based services search scheme in outsourced cloud

D Li, J Wu, J Le, X Liao, T Xiang - IEEE Transactions on Cloud …, 2021 - ieeexplore.ieee.org
… infer the user’s location privacy and query privacy based on the … to construct an identity
authentication scheme between the … achieve privacy-preserving location-based services search …

Efficient privacy-preserving scheme for location based services in VANET system

F Farouk, Y Alkady, R Rizk - IEEE Access, 2020 - ieeexplore.ieee.org
… a Registration authority (RA) is used to provide authentication and authorization services to
the … Once the TTP compromises, all privacy will be leaked because the TTP knows all the real …

Blockchain-based lightweight certificate authority for efficient privacy-preserving location-based service in vehicular social networks

H Shen, J Zhou, Z Cao, X Dong… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
… themiddle attacks resulting in the loss of millions of dollars. If it … leakage would take place.
To address this issue, most of the … authenticated ones to all other RSUs and vehicles located in …

SAVE: Efficient privacy-preserving location-based service bundle authentication in self-organizing vehicular social networks

Y Chen, T Zhou, J Zhou, Z Cao, X Dong… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… -riding attacks to enhance the authentication efficiency. Then, … bundles without disclosing
vehicular users’ location privacy. … achieves identity privacy, two levels of location privacy and …