Journal on Communications ›› 2016, Vol. 37 ›› Issue (7): 140-150.doi: 10.11959/j.issn.1000-436x.2016142
• Academic paper • Previous Articles Next Articles
Hai LIU,Xing-hua LI,Er-meng WANG,Jian-feng MA
Online:
2016-07-25
Published:
2016-07-28
Supported by:
Hai LIU,Xing-hua LI,Er-meng WANG,Jian-feng MA. Privacy enhancing method for dummy-based privacy protection with continuous location-based service queries[J]. Journal on Communications, 2016, 37(7): 140-150.
[1] | KRUMM J . A survey of computational location privacy[J]. Personal and Ubiquitous Computing, 2009,13(6):391-399. |
[2] | TIWARI S , KAUSHIK S , JAGWANI P , et al. A survey on LBS: sys-tem architecture, trends and broad research areas[C]// LNCS 7108: The 7th International Conference on Databases in Network Information Systems.Heidelberg:Springer. c2011:223-241. |
[3] | 王璐, 孟小峰 . 位置大数据隐私保护研究综述[J]. 软件学报, 2014,25(4):693-712. WANG L , MENG X F . Location privacy preservation in big data era: a survey[J]. Journal of Software, 2014,25(4):693-712. |
[4] | 王宇航, 张宏莉, 余翔湛 . 移动互联网中的位置隐私保护研究[J]. 通信学报, 2015,36(9):2015167. WANG Y H, , ZHANG H L , YU X Z . Research on location privacy in mobile Internet[J]. Journal on Communications, 2015,36(9):2015167. |
[5] | KIDO H , YANAGISAWA Y , SATOH T . An anonymous communica-tion technique using dummies for location-based services[C]// The International Conference on Pervasive Services 2005. Washington,IEEE, c2005:88-97. |
[6] | KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location-based services[C]// The 21st International Conference on Data Engineering Workshops. Washington,IEEE, c2005:1248. |
[7] | GRUTESER M , GRUNWALD . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st Interna-tional Conference on Mobile, Systems, Applications and Services. New York,ACM, c2003:31-42. |
[8] | TALUKDER N , AHAMED S I . Preventing multiquery attack in location-based services[C]// The 3rd ACM Conference on Wireless Network Security. New York,ACM, c2010:25-36. |
[9] | BERSFORD A R , STAJANO F . Mix zones: user privacy in loca-tion-aware services[C]// The 2nd IEEE Annual Conference on Perva-sive Computing and Communications Workshops. Washington,IEEE, c2004:127-131. |
[10] | GAO S , MA J F , SHI W S , et al. TrPF: a trajectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013,8(6):874-887. |
[11] | ARDAGNA C , CREMONINI M , DAMIANI E , et al. Location privacy protection through obfuscation-based techniques[C]// The 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security,Berlin: Springer. c2007:47-60. |
[12] | DAMIANI M L , BERTINO E , SILVESTRI . The probe framework for the personalized cloaking of private locations[J]. Transactions on Data Privacy, 2010,3(2):123-148. |
[13] | GHINITA G , KALNIS P , KHOSHGOZARAN A , et al. Private queries in location based services: anonymizers are not necessary[C]// The 2008 ACM SIGMOD International Conference on Management of Data. New York,ACM, c2008:121-132. |
[14] | MASCETTI S , FRENI D , BETTINI C , et al. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies[J]. VLDB Journal, 2011,20(4):541-566. |
[15] | LU H , JENSEN C S , YIU M L . Pad: privacy-area aware, dummy based location privacy in mobile services[C]// The Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access. New York,ACM, c2008:16-23. |
[16] | NIU B , LI Q , ZHU X et al. Achieving k-anonymity in privacy-aware loca-tion-based services[C]// The 33rd Annual IEEE International Conference on Computer Communications. Washington,IEEE, c2014:754-762. |
[17] | NIU B , ZHANG Z Y , LI X Q , et al. Privacy-area aware dummy gen-eration algorithms for location-based services[C]// The 2014 IEEE In-ternational Conference on Communication. Washington,IEEE, c2014:957-962. |
[18] | NIU B , LI Q , ZHU X , et al. Enhancing privacy through caching in location-based services[C]// The 34th Annual IEEE International Con-ference on Computer Communications. Washington,IEEE, c2015:1017-1025. |
[19] | XU T , CAI Y . Exploring historical location data for anonymity preser-vation in location-based services[C]// The 27th Conference on Com-puter Communications. Washington,IEEE, c2008:13-18. |
[20] | XU T , CAI Y . Feeling-based location privacy protection for loca-tion-based services[C]// The 16th ACM Conference on Computer and Communications Security. New York,ACM, c2009:348-357. |
[21] | CHOW C Y , MOKBEL M . Enabling private continuous queries for revealed user locations[C]// The 10th International Symposium on Spa-tial and Temporal Databases. Berlin,Springer, c2007:258-275. |
[22] | 潘晓, 郝兴, 孟小峰 . 基于位置服务中的连续查询隐私保护研究[J]. 计算机研究与发展, 2010,47(1):121-129. PAN X , HAO X , MENG X F . Privacy preserving towards continuous query in location-based services[J]. Journal of Computer Research and Development, 2010,47(1):121-129. |
[23] | WANG Y , XU D B , HE X , et al. L2P2: location-aware location pri-vacy protection for location-based services[C]// The 31st Annual IEEE International Conference on Computer Communication. Washington,IEEE, c2012:1996-2004. |
[24] | LI X H , WANG E M , YANG W D , et al. DALP: a demand-aware location privacy protection scheme in continuous location-based services[J]. Concurrency and Computation:Practice and Experience, 2016,28(4):1219-1236. |
[25] | SCHLEGEL R , CHOW C Y , HUANG Q , et al. User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing, 2015,14(10):2158-2172. |
[26] | BRINKOFFff T . A framework for generating network-based moving objects[J]. Geo Informatica, 2002,6(2):153-180. |
[1] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[2] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[3] | Jie WANG,Chunru WANG,Jianfeng MA,Hongtao LI. Dummy location selection algorithm based on location semantics and query probability [J]. Journal on Communications, 2020, 41(3): 53-61. |
[4] | Shaobo ZHANG,Qin LIU,Guojun WANG. Trajectory privacy protection method based on location obfuscation [J]. Journal on Communications, 2018, 39(7): 81-91. |
[5] | Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS [J]. Journal on Communications, 2018, 39(5): 134-142. |
[6] | Zhen-peng LIU,Xuan ZHAO,Ya-wei DONG,Bin ZHANG. Improved SpaceTwist privacy protection method based on anchor optimization algorithm [J]. Journal on Communications, 2017, 38(Z1): 32-38. |
[7] | Lei ZHANG,Chun-guang MA,Song-tao YANG,Zeng-peng LI. CP-ABE based users collaborative privacy protection scheme for continuous query [J]. Journal on Communications, 2017, 38(9): 76-85. |
[8] | Zhuo-xiong PEI,Xing-hua LI,Hai LIU,Kai-yue LEI,Jian-feng MA,Hui LI. Anonymizing region construction scheme based on query range in location-based service privacy protection [J]. Journal on Communications, 2017, 38(9): 125-132. |
[9] | Chang-li ZHOU,Hui TIAN,Chun-guang MA,Song-tao YANG. Research on LBS privacy preservation based on pseudorandom permutation in road network [J]. Journal on Communications, 2017, 38(6): 19-29. |
[10] | Lu-lu LI,Jia-feng HUA,Sheng WAN,Hui ZHU,Feng-hua LI. Achieving efficient location privacy protection based on cache [J]. Journal on Communications, 2017, 38(6): 148-157. |
[11] | Sheng WAN,Feng-hua LI,Ben NIU,Zhe SUN,Hui LI. Research progress on location privacy-preserving techniques [J]. Journal on Communications, 2016, 37(12): 124-141. |
[12] | Kai-yue LEI,Xing-hua LI,Hai LIU,Zhuo-xiong PEI,Jian-feng MA,Hui LI. Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation [J]. Journal on Communications, 2016, 37(12): 156-164. |
[13] | Chang-li ZHOU,Chun-guang MA,Song-tao YANG. Research of LBS privacy preserving based on sensitive location diversity [J]. Journal on Communications, 2015, 36(4): 126-136. |
[14] | Feng-hua LI,Cui ZHANG,Ben NIU,Hui LI,Jia-feng HUA,Guo-zhen SHI. Efficient scheme for user's trajectory privacy [J]. Journal on Communications, 2015, 36(12): 114-123. |
[15] | . LBS-oriented location privacy protection model and scheme [J]. Journal on Communications, 2014, 35(8): 15-124. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|