A novel location privacy-preserving scheme based on l-queries for continuous LBS

A Ye, Y Li, L Xu - Computer Communications, 2017 - Elsevier
Location cloaking based on k-anonymity is one of the most prevalent privacy-preserving
technologies for Location Based Services (LBS). However, it has been proved vulnerable to …

[引用][C] Anonymity level adaptation algorithm to meet resource constraint of k-anonymity service in LBS

ZH Yang, SP Li, X Lin - Journal of Zhejiang University. Engineering …, 2011 - Zhejiang Daxue

Ensuring privacy and security for LBS through trajectory partitioning

H Shin, J Vaidya, V Atluri, S Choi - 2010 Eleventh International …, 2010 - ieeexplore.ieee.org
The concept of location k-anonymity has been proposed to address the privacy issue of
location based services (LBS). Under this notion of anonymity, the adversary only has the …

Mobicache: When k-anonymity meets cache

X Zhu, H Chi, B Niu, W Zhang, Z Li… - 2013 IEEE Global …, 2013 - ieeexplore.ieee.org
Location-Based Services (LBSs) are becoming increasingly popular in our daily life. In some
scenarios, multiple users may seek data of same interest from a LBS server simultaneously …

Location privacy preservation mechanism for location-based service with incomplete location data

X Yang, L Gao, J Zheng, W Wei - IEEE Access, 2020 - ieeexplore.ieee.org
The Location-Based Service has been widely used for mobile communication networks and
location systems. However, privacy disclosure for incomplete collection location data in LBS …

PRIVE: anonymous location-based queries in distributed mobile systems

G Ghinita, P Kalnis, S Skiadopoulos - Proceedings of the 16th …, 2007 - dl.acm.org
Nowadays, mobile users with global positioning devices canaccess Location Based
Services (LBS) and query about pointsof interest in their proximity. For such applications to …

A similar quadtree based on location k-anonymity algorithm

F JIN, Z YE, H SONG - Transactions of Beijing institute of …, 2014 - journal.bit.edu.cn
Through optimizing the degree of anonymity and accuracy of location-based on services of
the Casper model, a similar quadtree based location K-anonymity algorithm is proposed …

[PDF][PDF] A novel dummy-based KNN query anonymization method in mobile services

H Zhao, J Wan, Z Chen - International Journal of Smart Home, 2016 - gvpress.com
Due to the advances of mobile devices with GPS (Global Positioning System), a user's
privacy threat is increased in location based services (LBSs). So, various Location Privacy …

Frequent location privacy-preserving algorithm based on geosocial network

X NING, Y LUO, K XING, X Zheng - Journal of Computer Applications, 2018 - joca.cn
Focusing on the attack of frequent location as background knowledge causing user identity
disclosure in geosocial network, a privacy-preserving algorithm based on frequent location …

Providenthider: An algorithm to preserve historical k-anonymity in lbs

S Mascetti, C Bettini, XS Wang, D Freni… - … conference on mobile …, 2009 - ieeexplore.ieee.org
One of the privacy threats recognized in the use of LBS is represented by an adversary
having information about the presence of individuals in certain locations, and using this …