Journal on Communications ›› 2015, Vol. 36 ›› Issue (5): 1-12.doi: 10.11959/j.issn.1000-436x.2015109
• Academic paper • Next Articles
AChun-guang M,HOUChang-li Z,ANGSong-tao Y,HAOYun-long Z
Online:
2015-05-20
Published:
2015-07-17
Supported by:
AChun-guang M,HOUChang-li Z,ANGSong-tao Y,HAOYun-long Z. Location privacy-preserving method in LBS based on Voronoi division[J]. Journal on Communications, 2015, 36(5): 1-12.
[1] | CHEEMA M A , ZHANG W , LIN X , et al. Efficiently processing snapshot and continuous reverse k nearest neighbors queries[J]. The VLDB Journal, 2012,21(5): 703-728. |
[2] | WU D , WANG X , SUN L , et al. Identity privacy-based reliable routing method in VANETs[J]. Peer-to-Peer Networking and Applications, 2014,7(3): 285-294. |
[3] | 薛姣, 刘向宇, 杨晓春, 王斌 等. 一种面向公路网络的位置隐私保护方法[J]. 计算机学报, 2011,34(5):865-878. XUE J , LIU X Y , YANG X C , et al. A location privacy preserving ap-proach on road network[J]. Chinese Journal of Computers, 2011,34(5):865-878. |
[4] | 潘晓, 郝兴, 孟小峰 . 基于位置服务中的连续查询隐私保护研究[J]. 计算机研究与发展, 2010,47(1):121-129. PAN X , HAO X , MENG X F . Privacy preserving towards continuous query in location-based services[J]. Journal of Computer Research and Development, 2010,47(1):121-129. |
[5] | GEDIK B , LIU L . Location privacy in mobile systems:a personalized anonymization model[A]. Distributed Computing Systems,ICDCS 2005,Proceedings of 25th IEEE International Conference[C]. 2005. 620-629. |
[6] | MOKBEL M F , CHOW C Y , AREF W G . The new Casper:query processing for location services without compromising privacy[A]. Proceedings of the 32nd International Conference on Very Large Data Bases[C].VLDB Endowment, 2006. 763-774. |
[7] | KALNIS P , GHINITA G , MOURATIDIS K , et al. Preventing loca-tion-based identity inference in anonymous spatial queries[J]. Knowl-edge and Data Engineering,IEEE Transactions, 2007,19(12): 1719-1733. |
[8] | GHINITA G , KALNIS P , SKIADOPOULOS S . PRIVE:anonymous location-based queries in distributed mobile systems[A]. Proceedings of the 16th International Conference on World Wide Web[C]. ACM, 2007. 371-380. |
[9] | CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service[A]. Proceedings of the 14th Annual ACM International Symposium on Advances in Geo-graphic Information Systems[C]. 2006. 171-178. |
[10] | HONG J I , LANDAY J A . An architecture for privacy-sensitive ubiqui-tous computing[A]. Proceedings of the 2nd International Conference on Mobile Systems,Applications,and Services[C]. 2004. 177-189. |
[11] | KIDO H , YANAGISAWA Y , SATOH T . An architecture for privacy-sensitive ubiqui-tous computing[A]. Perva-sive Services,Proceedings of International Conference[C]. 2005. 88-97. |
[12] | YIU M L , JENSEN C S , HUANG X G , LU H . SpaceTwist:managing the trade-offs among location privacy,query performance,and query accuracy in mobile services[A]. IEEE 24th International Conference on Data Engineering[C]. 2008. 366-375. |
[13] | GONG Z , SUN G Z , XIE X . Protecting privacy in location-based services using k-anonymity without cloaked region[A]. Mobile Data Management (MDM),2010 Eleventh International Conference[C]. 2010. 366-371. |
[14] | 黄毅, 霍峥, 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报, 2011,34(10):1976-1985. HANG Y , HUO Z , MENG X F . CoPrivacy:a collaborative location privacy-preserving method without cloaking region[J]. Chinese Journal of Computers, 2011,34(10):1976-1985. |
[15] | GRUSTER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[A]. Proceedings of the 1st International Conference on Mobile Systems,Applications and Services[C]. 2003. 31-42. |
[16] | MOKBEL M F . Towards privacy-aware location-based database serv-ers[A]. Data Engineering Workshops,Proceedings of 22nd Interna-tional Conference[C]. 2006. 93. |
[17] | CHOW C Y , MOKBEL M F , AREF W G . Casper*:query processing for location services without compromising privacy[J]. ACM Transac-tions on Database Systems (TODS), 2009,34(4): 24. |
[18] | LI T C , ZHU W T . Protecting user anonymity in location-based services with fragmented cloaking region[A]. Computer Science and Automation Engineering (CSAE),2012 IEEE International Conference[C]. 2012. 227-231. |
[19] | 杨松涛, 马春光, 周长利 . 面向LBS的隐私保护模型及方案[J]. 通信学报, 2014,35(8):116-124. YANG S T , MA C G , ZHOU C L . Privacy preserving towards continuous query in location-based services[J]. Journal on Communications, 2014,35(8):116-124. |
[20] | SAYE R I , SETHIAN J A . Analysis and applications of the Voronoi implicit interface method[J]. Journal of Computational Physics, 2012, 231(18): 6051-6085. |
[21] | LIN X , LU R , LIANG X , et al. STAP:A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preserva-tion in vanets[A]. INFOCOM,2011 Proceedings IEEE, 2011. 2147-2155. |
[1] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[2] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[3] | Ayong YE,Lingyu MENG,Ziwen ZHAO,Yiqing DIAO,Jiaomei ZHANG. Trajectory differential privacy protection mechanism based on prediction and sliding window [J]. Journal on Communications, 2020, 41(4): 123-133. |
[4] | Jie WANG,Chunru WANG,Jianfeng MA,Hongtao LI. Dummy location selection algorithm based on location semantics and query probability [J]. Journal on Communications, 2020, 41(3): 53-61. |
[5] | Weihao LI,Jin CAO,Hui LI. Privacy self-correlation privacy-preserving scheme in LBS [J]. Journal on Communications, 2019, 40(5): 57-66. |
[6] | Wenjing ZHANG,Qiao LIU,Hui ZHU. Evaluation and protection of multi-level location privacy based on an information theoretic approach [J]. Journal on Communications, 2019, 40(12): 51-59. |
[7] | Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS [J]. Journal on Communications, 2018, 39(5): 134-142. |
[8] | Qian ZHOU,Xiaolin QIN,Youwei DING. Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network [J]. Journal on Communications, 2018, 39(1): 101-116. |
[9] | Zhen-peng LIU,Xuan ZHAO,Ya-wei DONG,Bin ZHANG. Improved SpaceTwist privacy protection method based on anchor optimization algorithm [J]. Journal on Communications, 2017, 38(Z1): 32-38. |
[10] | Nan SHEN,Chun-fu JIA,Shuang LIANG,Rui-qi LI,Zhe-li LIU. Approach of location privacy protection based on order preserving encryption of the grid [J]. Journal on Communications, 2017, 38(7): 78-88. |
[11] | Lian-suo WEI,Shao-bin CAI,Shi PAN. Research on mobile strategy of anchor node based on weighted virtual force model [J]. Journal on Communications, 2017, 38(6): 97-107. |
[12] | Ying LIU,Zhi-hong QIAN. Moving anchor node localization algorithm based on network connectivity [J]. Journal on Communications, 2017, 38(4): 149-157. |
[13] | Xiao-guang NIU,Chuan-bo WEI,Ya-lan YAO. Energy-consumption-balanced efficient source-location privacy preserving protocol in WSN [J]. Journal on Communications, 2016, 37(4): 23-33. |
[14] | Sheng WAN,Feng-hua LI,Ben NIU,Zhe SUN,Hui LI. Research progress on location privacy-preserving techniques [J]. Journal on Communications, 2016, 37(12): 124-141. |
[15] | Chao LI,Li-hua YIN,Kui GENG,Bin-xing FANG. Location privacy preservation approach towards to content sharing on mobile online social network [J]. Journal on Communications, 2016, 37(11): 31-41. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|