Journal on Communications ›› 2017, Vol. 38 ›› Issue (8): 37-49.doi: 10.11959/j.issn.1000-436x.2017163
• Papers • Previous Articles Next Articles
Lei ZHANG1,2,Chun-guang MA1(),Song-tao YANG1,2,Zeng-peng LI1
Revised:
2017-06-14
Online:
2017-08-01
Published:
2017-09-07
Supported by:
CLC Number:
Lei ZHANG,Chun-guang MA,Song-tao YANG,Zeng-peng LI. Correlation probability indistinguishable location privacy protection algorithm[J]. Journal on Communications, 2017, 38(8): 37-49.
[1] | GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// 1st International Conference on Mobile Systems,Applications and Services. San Francisco,California,ACM, 2003: 31-42. |
[2] | GEDIK B , LING L . Location privacy in mobile systems:a personalized anonymization model[C]// Distributed Computing Systems,ICDCS 2005. 2005: 620-629. |
[3] | FUYU L , HUA K A , YING C . Query l-diversity in location-based services[C]// Mobile Data Management:Systems,Services and Middleware,2009 MDM′09 Tenth International Conference. 2009: 436-442. |
[4] | REBOLLO-MONEDERO D , FORNE J , SOLANAS A ,et al. Private location-based information retrieval through user collaboration[J]. Computer Communications, 2010,33(6): 762-774. |
[5] | REBOLLO-MONEDERO D , FORNE J , DOMINGO-FERRER J . Query profile obfuscation by means of optimal query exchange between users[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(5): 641-654. |
[6] | SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATOS P ,et al. Hiding in the mobile crowd:location privacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014,11(3): 266-279. |
[7] | NIU B , ZHU X Y , LI Q H ,et al. A novel attack to spatial cloaking schemes in location-based services[J]. Future Generation Computer Systems, 2015,49(C): 125-132. |
[8] | KHOSHGOZARAN A , SHIRANI-MEHR H , SHAHABI C . SPIRAL:a scalable private information retrieval approach to location privacy[C]// 2008 Ninth International Conference on Mobile Data Management Workshops. 2008: 49-56. |
[9] | KHOSHGOZARAN A , SHAHABI C , SHIRANI-MEHR H . Location privacy:going beyond K-anonymity,cloaking and anonymizers[J]. Knowledge and Information Systems, 2011,26(3): 435-465. |
[10] | LIEN I T , LIN Y H , SHIEH J R ,et al. A novel privacy preserving location-based service protocol with secret circular shift for k-NN search[J]. IEEE Transactions on Information Forensics and Security, 2013,8(6): 863-873. |
[11] | PAULET R , KAOSAR M G , YI X ,et al. Privacy-preserving and content-protecting location based queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(5): 1200-1210. |
[12] | BEN N , QINGHUA L , XIAOYAN Z ,et al. Enhancing privacy through caching in location-based services[C]// Computer Communications(INFOCOM),2015 IEEE Conference. 2015: 1017-1025. |
[13] | MA C G , ZHOU C L , YANG S T . A Voronoi-based location privacy-preserving method for continuous query in LBS[J]. International Journal of Distributed Sensor Networks, 2015,11(3): 1-17. |
[14] | SCHLEGEL R , CHOW C Y , HUANG Q ,et al. User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing, 2015,14(10): 2158-2172. |
[15] | WANG Y , XIA Y , HOU J ,et al. A fast privacy-preserving framework for continuous location-based queries in road networks[J]. Journal of Network and Computer Applications, 2015,53: 57-73. |
[16] | PALANISAMY B , LIU L . Attack-resilient mix-zones over road networks:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015,14(3): 495-508. |
[17] | GAO S , MA J F , SHI W S ,et al. LTPPM:a location and trajectory privacy protection mechanism in participatory sensing[J]. Wireless Communications & Mobile Computing, 2015,15(1): 155-169. |
[18] | HWANG R H , HSUEH Y L , CHUNG H W . A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014,7(2): 126-139. |
[19] | OZER M , KELES I , TOROSL U ,et al. Predicting the next location change and time of change for mobile phone users[C]// Third ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems.Dallas,Texas,ACM. 2014: 51-59. |
[20] | XUE A Y , ZHANG R , ZHENG Y ,et al. Destination prediction by sub-trajectory synthesis and privacy protection against such prediction[C]// 29th IEEE International Conference on Data Engineering(ICDE).Brisbane,AUSTRALIA. 2013: 254-265. |
[21] | SU H , ZHENG K , WANG H ,et al. Calibrating trajectory data for similarity-based analysis[C]// 2013 ACM SIGMOD International Conference on Management of Data. ACM, 2013: 833-844. |
[22] | CHEN X , PANG J , XUE R . Constructing and comparing user mobility profiles[J]. ACM Transactions on the Web, 2014,8(4): 21-25. |
[23] | LEI Z , CHUNGUANG M , SONGTAO Y . Location association similar based anonymus algorithm[J]. China Sciencepaper, 2016,11(2): 197-201,231. |
[24] | NIU B , QINGHUA L , XIAOYAN Z ,et al. Achieving k-anonymity in privacy-aware location-based services[C]// INFOCOM,2014 Proceedings IEEE. 2014: 754-762. |
[25] | DWORK C , . DIfferential privacy[C]// Lecture Notes in Computer Science. 2006: 1-12. |
[26] | XIONG L . Adaptive differentially private data release for data sharing and data mining[J]. 2013 IEEE 13th International Conference on Data Mining Workshops(ICDMW), 2013: 891-891. |
[27] | CHENG X , SU S , XU S Z ,et al. DP-Apriori:a differentially private frequent itemset mining algorithm based on transaction splitting[J]. Computers & Security, 2015,50: 74-90. |
[28] | XU J , ZHANG Z J , XIAO X K ,et al. Differentially private histogram publication[J]. VLDB Journal, 2013,22(6): 797-822. |
[29] | RIBONI D , BETTINI C . Incremental release of differentially-private check-in data[J]. Pervasive and Mobile Computing, 2015,16: 220-238. |
[30] | DEWRI R . Local differential perturbations:location privacy under approximate knowledge attackers[J]. IEEE Transactions on Mobile Computing, 2013,12(12): 2360-2372. |
[31] | ANDRéS M E , BORDENABE N E , CHATZIKOKOLAKIS K ,et al. Geo-indistinguishability:differential privacy for location-based systems[C]// 2013 ACM SIGSAC Conference on Computer & Communications Security. ACM, 2013: 901-914. |
[32] | BORDENABE N E , CHATZIKOKOLAKIS K , PALAMIDESSI C . Optimal geo-indistinguishable mechanisms for location privacy[C]// 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2014: 251-262. |
[33] | PRIMAULT V , MOKHTAR S B , LAURADOUX C ,et al. Differentially private location privacy in practice[J]. arxiv:1410.7744. |
[34] | CHATZIKOKOLAKIS K , PALAMIDESSI C , STRONATI M . Geo-indistinguishability:a principled approach to location privacy[M]// Distributed Computing and Internet Technology. 2015: 49-72. |
[35] | PERAZZO P , DINI G . A uniformity-based approach to location privacy[J]. Computer Communications, 2015,64: 21-32. |
[1] | Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA. Byzantine-robust federated learning over Non-IID data [J]. Journal on Communications, 2023, 44(6): 138-153. |
[2] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[3] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[4] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[5] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[6] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[7] | Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG. Efficient strong privacy protection and transferable attribute-based ticket scheme [J]. Journal on Communications, 2022, 43(3): 63-75. |
[8] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[9] | Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG. Privacy protection of warning message publishing protocol in VANET [J]. Journal on Communications, 2021, 42(8): 120-129. |
[10] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[11] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
[12] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[13] | Guangjun LIU, Wangmei GUO, Jinbo XIONG, Ximeng LIU, Changyu DONG. Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage [J]. Journal on Communications, 2021, 42(7): 220-230. |
[14] | Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU. Android application privacy protection mechanism based on virtual machine bytecode injection [J]. Journal on Communications, 2021, 42(6): 171-181. |
[15] | Youhuizi LI, Yuyu YIN, Honghao GAO, Yi JIN, Xinheng WANG. Survey on privacy protection in non-aggregated data sharing [J]. Journal on Communications, 2021, 42(6): 195-212. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|