User Personalized Location k Anonymity Privacy Protection Scheme with Controllable Service Quality

T Liu, G Yan, G Cai, Q Wang, M Yang - … 8–10, 2020, Proceedings, Part I 3, 2020 - Springer
The existing location privacy protection methods only provide the privacy protection
parameter k for users to choose to achieve their personalized privacy protection …

A distributed k-anonymity protocol for location privacy

G Zhong, U Hengartner - 2009 IEEE International Conference …, 2009 - ieeexplore.ieee.org
To benefit from a location-based service, a person must reveal her location to the service.
However, knowing the person's location might allow the service to re-identify the person …

Improvement of k-anonymity location privacy protection algorithm based on Hierarchy clustering

ZQ He, G Chen - Applied Mechanics and Materials, 2014 - Trans Tech Publ
The k anonymity was one of the first algorithms applied for privacy protection in location-
based service (LBS). The k anonymity exhibits its disadvantages gradually, such as being …

Location Privacy‐Preserving Method Based on Historical Proximity Location

X Guo, W Wang, H Huang, Q Li… - … and mobile computing, 2020 - Wiley Online Library
With the rapid development of Internet services, mobile communications, and IoT
applications, Location‐Based Service (LBS) has become an indispensable part in our daily …

Efficient dummy generation for protecting location privacy in location based services

T Cai, J Youn, D Song, K Park - Journal of Internet Computing and …, 2017 - koreascience.kr
For enjoying the convenience provided by location based services, the user needs to submit
his or her location and query to the LBS server. So there is a probability that the untrusted …

Anonymizing but Deteriorating Location Databases

T Khanh Dang, T Anh Truong - Polibits, 2012 - scielo.org.mx
The tremendous development of location–based services and mobile devices has led to an
increase in location databases. Through the data mining process, valuable information can …

[PDF][PDF] A privacy-enhancing scheme against contextual knowledge-based attacks in location-based services

J Hua, Y Liu, Y Shen, X Tian, Y Luo… - Frontiers of Computer …, 2020 - journal.hep.com.cn
Among the previous approaches to privacy preservation, k-anonymity-based ones have
drawn much research attention [1–3]. However, some privacy concern will be aroused if …

A clustering K-anonymity scheme for location privacy preservation

L Yao, G Wu, J Wang, F Xia, C Lin… - IEICE Transactions on …, 2012 - search.ieice.org
The continuous advances in sensing and positioning technologies have resulted in a
dramatic increase in popularity of Location-Based Services (LBS). Nevertheless, the LBS …

Novel location privacy protection strategies for location-based services

PP Lindenberg, BC Cheng… - … Conference on Ubiquitous …, 2015 - ieeexplore.ieee.org
The usage of Location-Based Services (LBS) holds a potential privacy issue when people
exchange their locations for information relative to these locations. While most people …

A method of location privacy protection in road network environment

J Wen, Z Li - MATEC Web of Conferences, 2018 - matec-conferences.org
With the widespread application of location-based services, users' privacy concerns have
become the focus of users' attention. Based on the k-anonymity method and the SpaceTwist …