Journal on Communications ›› 2016, Vol. 37 ›› Issue (11): 31-41.doi: 10.11959/j.issn.1000-436x.2016212
• academic paper • Previous Articles Next Articles
Chao LI1,Li-hua YIN1,Kui GENG1(),Bin-xing FANG2
Online:
2016-11-25
Published:
2016-11-30
Supported by:
Chao LI,Li-hua YIN,Kui GENG,Bin-xing FANG. Location privacy preservation approach towards to content sharing on mobile online social network[J]. Journal on Communications, 2016, 37(11): 31-41.
[1] | ILIA p , POLAKIS I , ATHANASOPOULOS E . Face/Off: preventing privacy leakage from photos in social networks[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015:781-792. |
[2] | NAINI F M , UNNIKRISHNAN J , THIRAN P . Where you are is who you are: user identification by matching statistics[J]. IEEE Transactions on Information Forensics and Security, 2016,11(2):358-372. |
[3] | DATELINE NBC . Tracing a stalker[EB/OL]. , 2013. |
[4] | VOELCKER J . Stalked by satellite: an alarming rise in gps-enabled harassment[J]. IEEE Spectrum, 2006,47(7):15-16. |
[5] | WEBROOT SOFTWARE . Webroot survey finds geolocation apps prevalent amongst mobile device users, but 55\% concerned about loss of privacy[EB/OL]. , 2010. |
[6] | Half of social networkers online concerned about privacy[EB/OL]. , 2010. |
[7] | CHOW C Y , MOKBEL M F , LIU X , et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]// The 14th Annual ACM International Symposium on Advances in Geographic Information Systems. 2006:171-178. |
[8] | GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st International Conference on Mobile Systems, Applications and Services. New York, USA: ACM, 2003:31-42. |
[9] | KALNIS P , GHINITA G , MOURATIDIS K . Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, IEEE, 2007,19(12):1719-1733. |
[10] | GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, IEEE, 2008,7(1):1-18. |
[11] | HU H , XU J , ON S T . Privacy-aware location data publishing[J]. ACM Transactions on Database Systems (TODS), ACM, 2010,35(3):1-40. |
[12] | 李凤华, 李晖, 贾焰 . 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4):1-11. LI F H , LI H , JIA Y . Privacy computing: concept, connotation and its research trend[J]. Journal on Communications, 2016,37(4):1-11. |
[13] | KRUMM J . A survey of computational location privacy[J]. Personal and Ubiquitous Computing, London, UK, UK: Springer-Verlag, 2009,13(6):391-399. |
[14] | BETTINI C , WANG X , JAJODIA S . Protecting privacy against location-based personal identification[J]. Secure Data Management, 2005,3674:185-199. |
[15] | CHOW C Y , MOKBEL M F . Trajectory privacy in location-based services and data publication[C]// SIGKDD 2011,19-29. |
[16] | DUCKHAM M , KULIK L . A formal model of obfuscation and negotiation for location privacy[J]. Pervasive Computing, 2005,3468:152-170. |
[17] | DAMIANI M L . Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends[C]// European Data Protection: Coming of Age. Springer, 2013:223-239. |
[18] | DAMIANI M , BERTINO E , SILVESTRI C . Protecting location privacy through semantics-aware obfuscation techniques[C]// IFIPTM, 2008:231-245. |
[19] | KLEMPERER P , LIANG Y , MAZUREK M . Tag, you can see it!:using tags for access control in photo sharing[C]// The SIGCHI Conference on Human Factors in Computing Systems. 2012:377-386. |
[20] | XU K , GUO Y , GUO L . My privacy my decision: control of photo sharing on online social networks[J]. IEEE Transactions on Dependable and Secure Computing, 2015,(99):1. |
[21] | WISHART R , CORAPI D , MARINOVIC S . Collaborative privacy policy authoring in a social networking context[C]// Policies for Distributed Systems and Networks. 2010 IEEE International Symposium. 2010:1-8. |
[22] | WANG Y , ZHAI E , LUA E K . ISAC: Intimacy based access control for social network sites[C]// Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC). 2012:517-524. |
[23] | FONG P W L . Relationship-based access control: protection model and policy language[C]// The First ACM Conference on Data and Application Security and Privacy. 2011:191-202. |
[24] | CARMINATI B , FERRARI E , PEREGO A . Enforcing access control in web-based social networks[J]. ACM Transactions on Information and System Security (TISSEC), 2009,13(1):6. |
[25] | GATES C . Access control requirements for web 2.0 security and privacy[J]. IEEE Web, 2007,2. |
[26] | HOUGHTON D J , JOINSON A N . Privacy, social network sites, and social relations[J]. Journal of Technology in Human Services, Taylor& Francis, 2010,28(1-2):74-94. |
[27] | JOSHI J B , BERTINO E , LATIF U . A generalized temporal role-based access control model[J]. IEEE Transactions on Knowledge and Data Engineering, 2005,17(1):4-23. |
[28] | GREENE K , DERLEGA V J , MATHEWS A . Self-disclosure in personal relationships[M]. The Cambridge Handbook of Personal Relationships, 2006:409-427. |
[29] | WIESE J , KELLEY P G , CRANOR L F . Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share[C]// The 13th international conference on Ubiquitous computing. 2011:197-206. |
[30] | SUCH J M , ROVATSOS M . Privacy policy negotiation in social media[J]. ACM Trans Auton Adapt Syst, New York, NY, USA: ACM, 2016,11(1):4:1-4:29. |
[31] | SWEENEY L . k-anonymity: a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002,10(7):557-570. |
[32] | LIU Y , WEI W , SUN A . Exploiting geographical neighborhood characteristics for location recommendation[C]// The 23rd ACM International Conference on Conference on Information and Knowledge Management - CIKM '14. 2014:739-748. |
[33] | Real datasets for spatial databaes: road networks and points of Internet[EB/OL]. . |
[1] | Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao. Privacy-preserving precise profile matching in mobile social network [J]. Journal on Communications, 2022, 43(11): 90-103. |
[2] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[3] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[4] | Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU. Edge computing privacy protection method based on blockchain and federated learning [J]. Journal on Communications, 2021, 42(11): 28-40. |
[5] | Ayong YE,Lingyu MENG,Ziwen ZHAO,Yiqing DIAO,Jiaomei ZHANG. Trajectory differential privacy protection mechanism based on prediction and sliding window [J]. Journal on Communications, 2020, 41(4): 123-133. |
[6] | Jie WANG,Chunru WANG,Jianfeng MA,Hongtao LI. Dummy location selection algorithm based on location semantics and query probability [J]. Journal on Communications, 2020, 41(3): 53-61. |
[7] | Zhu WANG,Kun HE,Xinyu WANG,Ben NIU,Fenghua LI. Traffic characteristic based privacy leakage assessment scheme for Android device [J]. Journal on Communications, 2020, 41(2): 155-164. |
[8] | Weihao LI,Jin CAO,Hui LI. Privacy self-correlation privacy-preserving scheme in LBS [J]. Journal on Communications, 2019, 40(5): 57-66. |
[9] | Wenjing ZHANG,Qiao LIU,Hui ZHU. Evaluation and protection of multi-level location privacy based on an information theoretic approach [J]. Journal on Communications, 2019, 40(12): 51-59. |
[10] | Yuanzhi YAO,Feng WANG,Wenbo YAN,Nenghai YU. Image privacy preservation scheme based on QR code and reversible visible watermarking [J]. Journal on Communications, 2019, 40(11): 65-75. |
[11] | Yatao YANG,Xinguang HAN,Jierun HUANG,Yang ZHAO. Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE [J]. Journal on Communications, 2019, 40(11): 180-186. |
[12] | Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS [J]. Journal on Communications, 2018, 39(5): 134-142. |
[13] | Xiaoying ZHANG,Hui PENG,Hong CHEN. State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks [J]. Journal on Communications, 2018, 39(10): 130-142. |
[14] | Qian ZHOU,Xiaolin QIN,Youwei DING. Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network [J]. Journal on Communications, 2018, 39(1): 101-116. |
[15] | Nan SHEN,Chun-fu JIA,Shuang LIANG,Rui-qi LI,Zhe-li LIU. Approach of location privacy protection based on order preserving encryption of the grid [J]. Journal on Communications, 2017, 38(7): 78-88. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|