Location privacy-preserving mechanisms in location-based services: A comprehensive survey

H Jiang, J Li, P Zhao, F Zeng, Z Xiao… - ACM Computing Surveys …, 2021 - dl.acm.org
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …

Privacy in the smart city—applications, technologies, challenges, and solutions

D Eckhoff, I Wagner - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …

Privacy-preserving data mining: methods, metrics, and applications

R Mendes, JP Vilela - IEEE Access, 2017 - ieeexplore.ieee.org
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …

Geo-indistinguishability: Differential privacy for location-based systems

ME Andrés, NE Bordenabe, K Chatzikokolakis… - Proceedings of the …, 2013 - dl.acm.org
The growing popularity of location-based systems, allowing unknown/untrusted servers to
easily collect huge amounts of information regarding users' location, has recently started …

Security and privacy in device-to-device (D2D) communication: A review

M Haus, M Waqas, AY Ding, Y Li… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …

A framework for protecting worker location privacy in spatial crowdsourcing

H To, G Ghinita, C Shahabi - Proceedings of the VLDB Endowment, 2014 - dl.acm.org
Spatial Crowdsourcing (SC) is a transformative platform that engages individuals, groups
and communities in the act of collecting, analyzing, and disseminating environmental, social …

The long road to computational location privacy: A survey

V Primault, A Boutet, SB Mokhtar… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …

Secure k-nearest neighbor query over encrypted data in outsourced environments

Y Elmehdwi, BK Samanthula… - 2014 IEEE 30th …, 2014 - ieeexplore.ieee.org
For the past decade, query processing on relational data has been studied extensively, and
many theoretical and practical solutions to query processing have been proposed under …

Secure kNN computation on encrypted databases

WK Wong, DW Cheung, B Kao… - Proceedings of the 2009 …, 2009 - dl.acm.org
Service providers like Google and Amazon are moving into the SaaS (Software as a
Service) business. They turn their huge infrastructure into a cloud-computing environment …

A location privacy-preserving system based on query range cover-up or location-based services

Z Wu, R Wang, Q Li, X Lian, G Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Location-based service (LBS) has been widely used in various fields of industry, and
become a vital part of people's daily life. However, while providing great convenience for …