An efficient location privacy protection scheme based on the Chinese remainder theorem

J Wang, Y Han, X Yang - Tsinghua Science and Technology, 2016 - ieeexplore.ieee.org
Traditional k-anonymity schemes cannot protect a user's privacy perfectly in big data and
mobile network environments. In fact, existing k-anonymity schemes only protect location in …

Using location k-anonymity models for protecting location privacy

E Di Carlo, H Shin, H Lu - … Companion to Risk, Crisis and Security …, 2018 - taylorfrancis.com
Location-based services (LBS) provide useful information about the area around a user
without requiring the user to input his/her location to identify the location. The continuing rise …

Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain

H Wang, H Huang, Y Qin, Y Wang, M Wu - ISPRS International Journal of …, 2017 - mdpi.com
Currently, although prevalent location privacy methods based on k-anonymizing spatial
regions (K-ASRs) can achieve privacy protection by sacrificing the quality of service (QoS) …

A personalized k-anonymity with fake position generation for location privacy protection

Z Luo, X Huang - Frontiers in Internet Technologies: Third CCF Internet …, 2015 - Springer
Privacy protection has become one of the important issues for location-based services (LBS)
nowadays. In order to meet the requirements of humanization, security and quick response …

Distributed K-Anonymous Location Privacy Protection Algorithm Based on Interest Points and User Social Behavior

L Xing, D Zhang, H Wu, H Ma, X Zhang - Electronics, 2023 - mdpi.com
Location-based services have become an important part of our daily lives, and while users
enjoy convenient Internet services, they also face the risk of privacy leakage. K-anonymity is …

Improved privacy preserving score-based location k-anonymity in lbs

LP Yeluri, E Madhusudhana Reddy - Innovations in Computer Science …, 2020 - Springer
The extensive use of the location-based services in today's communication world has
created tremendous interest. Considering the importance of these services, the demand for …

[PDF][PDF] Privacy-area aware all-dummy-based location privacy algorithms for location-based services

H Zhao, X Yi, J Wan - DEStech Transactions on Computer …, 2016 - scholar.archive.org
Location-Based Services (LBSs) have become one of the most popular activities in our daily
life. With the rapid advance of LBSs, there are more threats to users' privacy. For this reason …

An effective location privacy-preserving k-anonymity scheme in location based services

H Liu, S Zhang, M Li, VKA Sandor… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
With the development of global positioning systems, communication technologies, the
Internet and mobile terminals, location-based services (LBS) have become increasingly …

Achieving k-anonymity in privacy-aware location-based services

B Niu, Q Li, X Zhu, G Cao, H Li - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
Location-Based Service (LBS) has become a vital part of our daily life. While enjoying the
convenience provided by LBS, users may lose privacy since the untrusted LBS server has …

EPLA: efficient personal location anonymity

D Zhao, Y Jin, K Zhang, X Wang, PCK Hung, W Ji - GeoInformatica, 2018 - Springer
A lot of researchers utilize side-information, such as the map which is likely to be exploited
by some attackers, to protect users' location privacy in location-based service (LBS) …