Journal on Communications ›› 2015, Vol. 36 ›› Issue (3): 12-20.doi: 10.11959/j.issn.1000-436x.2015054
• academic paper • Previous Articles Next Articles
Sheng GAO,Jian-feng MA,Qing-song YAO,Cong SUN
Online:
2015-03-25
Published:
2017-06-21
Supported by:
Sheng GAO,Jian-feng MA,Qing-song YAO,Cong SUN. Towards cooperation location privacy-preserving group nearest neighbor queries in LBS[J]. Journal on Communications, 2015, 36(3): 12-20.
[1] | 周傲英, 杨彬, 金澈清 等. 基于位置的服务:架构与进展[J]. 计算机学报, 2011,34(7):1155-1171. ZHOU A Y , YANG B , JIN C Q , et al. Location-based services:archi-tecture and progress[J]. Chinese Journal of Computers, 2011,34(7):1155-1171. |
[2] | VIRRANTAUS K , MARKKULA J , GARMASH A , et al. Developing GIS-supported location-based services[A]. WISE[C]. Kyoto, 2001.66-75. |
[3] | GRUTESTER M , GRUNWALD D . Anonymous usage of loca-tion-based services through spatial and temporal cloaking[A]. Mobi-Sys[C]. USA, 2003.31-42. |
[4] | SWEENEY L . k-Anonymity: a model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Konwledge Based Systems, 2002,10(5):557-570. |
[5] | CHOW C Y , MOKBEL M F . Privacy in location-based services: a system architecture perspective[J]. SIGSPATIAL Special, 2009,1(2):23-27. |
[6] | MOKBEL M F , CHOW C Y , AREF W G . The new Casper: query processing for location services without compromising privacy[A]. VLDB[C]. Seoul Korea, 2006.763-774. |
[7] | XIAO Z , MENG X , XU J . Quality aware privacy protection for loca-tion-based services[A]. DASFAA[C]. Thailand, 2007.434-446. |
[8] | GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7(1):1-18. |
[9] | BAMBA B , LIU L , PESTI P , et al. Supporting anonymous location queries in mobile environments with privacygrid[A]. WWW[C]. Bei-jing, China, 2008.237-246. |
[10] | WANG Y , XU D , HE X , et al. L2P2:location-aware location privacy protection for location-based services[A]. INFOCOM[C]. Orlando, FL, USA, 2012.1996-2004. |
[11] | SHOKRI R , THEODORAKOPOULOS G , TRONCOSO C , et al. Protecting location privacy: optimal strategy against localization at-tacks[A]. CCS[C]. North Carolina, USA, 2012.617-627. |
[12] | GAO S , MA J F , SHI W S , et al. LTPPM: a location and trajectory privacy protection mechanism in participatory sensing[J]. Wireless Communications and Mobile Computing, 2015,15(1):155-169. |
[13] | GHINITA G , KALNIS P , KHOSHGOZARAN A , et al. Private queries in location based services: anonymizers are not necessary[A]. ACM SIGMOD[C]. Vancouver, BC, Canada, 2008.121-132. |
[14] | YIU M L , JENSEN C S , HUANG X , et al. SpaceTwist:managing the trade-offs among location privacy, query performance, and query ac-curacy in mobile services[A]. ICDE[C]. Mexico, 2008.366-375. |
[15] | HASHEM T , KULIK L . Don't trust anyone: privacy protection for location-based services[J]. Pervasive and Mobile Computing, 2011,7(1):44-59. |
[16] | PAPADIAS D , SHEN Q , TAO Y , et al. Group nearest neighbor queries[A]. ICDE[C]. MA, USA, 2004.301-312. |
[17] | PAPADIAS D , TAO Y , MOURATIDIS K , et al. Aggregate nearest neighbor queries in spatial databases[J]. ACM Transactions on Data-base Systems, 2005,30(2):529-576. |
[18] | LIAN X , L CHEN , LIAN X , et al. Probabilistic group nearest neighbor queries in uncertain databases[J]. IEEE Transactions on Knowledge and Data Engineering, 2008,20(6):809-824. |
[19] | HASHEM T , KULIK L , ZHANG R . Privacy preserving group nearest neighbor queries[A]. EDBT[C]. Lausanne, 2010.489-500. |
[20] | HUANG Y , VISHWANATHAN R . Privacy preserving group nearest neighbour queries in location-based services using cryptographic techniques[A]. GLOBECOM[C]. Miami, FL, 2010.1-5. |
[21] | ASHOURI-TALOUKI M , BARAANI-DASTJERDI A , SELCUK A A . GLP: a cryptographic approach for group location privacy[J]. Computer Communications, 2012,35(12):1527-1533. |
[22] | SOLANAS A , MARTINEZ-BALLESTE A . A TTP-free protocol for location privacy in location-based services[J]. Computer Communications, 2008,31(6):1181-1191. |
[23] | CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service[A]. SIGSPATIAL GIS[C]. New York, NY, USA, 2006.171-178. |
[24] | CHE Y , YANG Q , HONG X . A dual-active spatial cloaking algorithm for location privacy preserving in mobile peer-to-peer networks[A]. WCNC[C]. Paris, France, 2012.2098-2102. |
[25] | FOUQUE P A , POUPARD G , STERN J . Sharing decryption in the context of voting or lotteries[A]. FC[C]. London, 2001.90-104. |
[26] | 雷浩 等. 面向有差异群体的联合决策方案[J]. 电子学报, 2005,33(8):1523-1528. LEI H , et al. A joint decision-making scheme for groups with members having different superiorities[J]. Chinese Journal of Electronics, 2005,33(8):1523-1528. |
[27] | SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11):612-613. |
[28] | PAILLIER P . Public-key cryptosystems based on composite degree residuosity classes[A]. EUROCRYPT[C]. Prague, 1999.223-238. |
[29] | DAMGARD I , FAZIO N , NICOLOSI A . Non-interactive zero-knowledge from homomorphic encryption[A]. TCC[C]. New York, NY, USA, 2006.41-59. |
[1] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[2] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[3] | Ayong YE,Lingyu MENG,Ziwen ZHAO,Yiqing DIAO,Jiaomei ZHANG. Trajectory differential privacy protection mechanism based on prediction and sliding window [J]. Journal on Communications, 2020, 41(4): 123-133. |
[4] | Jie WANG,Chunru WANG,Jianfeng MA,Hongtao LI. Dummy location selection algorithm based on location semantics and query probability [J]. Journal on Communications, 2020, 41(3): 53-61. |
[5] | Weihao LI,Jin CAO,Hui LI. Privacy self-correlation privacy-preserving scheme in LBS [J]. Journal on Communications, 2019, 40(5): 57-66. |
[6] | Wenjing ZHANG,Qiao LIU,Hui ZHU. Evaluation and protection of multi-level location privacy based on an information theoretic approach [J]. Journal on Communications, 2019, 40(12): 51-59. |
[7] | Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS [J]. Journal on Communications, 2018, 39(5): 134-142. |
[8] | Qian ZHOU,Xiaolin QIN,Youwei DING. Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network [J]. Journal on Communications, 2018, 39(1): 101-116. |
[9] | Nan SHEN,Chun-fu JIA,Shuang LIANG,Rui-qi LI,Zhe-li LIU. Approach of location privacy protection based on order preserving encryption of the grid [J]. Journal on Communications, 2017, 38(7): 78-88. |
[10] | Xiao-guang NIU,Chuan-bo WEI,Ya-lan YAO. Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN [J]. Journal on Communications, 2016, 37(4): 23-33. |
[11] | Sheng WAN,Feng-hua LI,Ben NIU,Zhe SUN,Hui LI. Research progress on location privacy-preserving techniques [J]. Journal on Communications, 2016, 37(12): 124-141. |
[12] | Chao LI,Li-hua YIN,Kui GENG,Bin-xing FANG. Location privacy preservation approach towards to content sharing on mobile online social network [J]. Journal on Communications, 2016, 37(11): 31-41. |
[13] | Yu-hang WANG,Hong-li ZHANG,Xiang-zhan YU. Research on location privacy in mobile internet [J]. Journal on Communications, 2015, 36(9): 230-243. |
[14] | Xiao-guang NIU,Chuan-bo WEI,Wei-jiang FENG,Guo-jun PENG,Huan-guo ZHANG. ONSA:optimal non-uniformly statistic-source anonymity protocol in WSN [J]. Journal on Communications, 2015, 36(6): 66-77. |
[15] | AChun-guang M,HOUChang-li Z,ANGSong-tao Y,HAOYun-long Z. Location privacy-preserving method in LBS based on Voronoi division [J]. Journal on Communications, 2015, 36(5): 1-12. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|