Journal on Communications ›› 2018, Vol. 39 ›› Issue (5): 134-142.doi: 10.11959/j.issn.1000-436x.2018084
• Papers • Previous Articles Next Articles
Weihao LI,Sheng DING,Jiajie MENG,Hui LI
Revised:
2018-03-03
Online:
2018-05-01
Published:
2018-06-01
Supported by:
CLC Number:
Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS[J]. Journal on Communications, 2018, 39(5): 134-142.
[1] | GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7(1): 1-18. |
[2] | PINGLY A,YU W , ZHANG N , FU X ,et al. Cap:a context-aware privacy protection system for location-based services[C]// ICDCS. 2009: 49-57. |
[3] | LI X,ZHANG C , JUNG T , QIAN J ,et al. Graph-based privacy-preserving data publication[C]// INFOCOM. 2016. |
[4] | CHEN Z , HU X , JU X ,et al. Lisa:location information scrambler for privacy protection on smartphones[C]// CNS. 2013. |
[5] | ANDRES M , BORDENABE N , CHATZIKOKOLAKIS K ,et al. Geo-indistinguishability:differential privacy for location-based systems[C]// CCS. 2013. |
[6] | PERAZZO P , DINI G . A uniformity-based approach to location privacy[J]. Computer Communications, 2015,64(1): 21-32. |
[7] | NIU B , LI Q , ZHU X ,et al. Achieving k-anonymity in privacy-aware location-based services[C]// INFOCOM. 2014. |
[8] | NIU B , LI Q , ZHU X ,et al. Enhancing privacy through caching in location-based services[C]// INFOCOM. 2015. |
[9] | SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATIS P ,et al. Hiding in the mobile crowd:Location privacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014,11(3): 266-279. |
[10] | 黄毅, 霍峥, 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报, 2011,34(10): 1976-1985. |
HUANG Y , HUO Z , MENG X F . CoPrivacy:a collaborative location privacy-preserving method without cloaking region[J]. Chinese Journal of Comuputers, 2011,34(10): 1976-1985. | |
[11] | YI X , PAULET R , BERTINO E ,et al. Practical approximate K nearest neighbor queries with location and query privacy[J]. IEEE Transactions on Knowledge and Data Engineering, 2016,PP(99): 1-14. |
[12] | PAULET R , KAOSAR M , YI X ,et al. Privacy-preserving and content-protecting location based queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(5): 1200-1210. |
[13] | CHOW C , MOKBEL M , LIU X . Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J]. GeoInformatica, 2011,15(2): 351-380. |
[14] | MOKEL M , CHOW C , AREF W . The new casper:query processing for location services without compromising privacy[J]. The IEEE VLDB Journal, 2006. |
[15] | ZHANG X , XIA Y , BAE H . A novel location privacy preservation method for moving object[J]. International Journal of Security and Its Applications, 2015,9(2): 1-12. |
[16] | BERESFORD A , STAJANO F . Location privacy in pervasive computing[J]. IEEE Pervasive Computing, 2003,2(1): 46-55. |
[17] | PALANISAMY B , LIU L . Attack-resilient mix-zones over road networks:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015,14(3): 495-508. |
[18] | MEYEROWITZ J , CHOUDHURY R . Hiding stars with fireworks:location privacy through camouflage[C]// MobiCom. 2009. |
[19] | XU T , CAI T . Feeling-based location privacy protection for location-based services[C]// CCS. 2009. |
[20] | MONTAZERI Z , HOUMANSADR A , PISHRO H . Achieving perfect location privacy in wireless devices using anonymization[J]. IEEE Transactions on Information Forensics and Security, 2017,PP(99): 1. |
[21] | WANG X , PANDE A , ZHU J ,et al. Stamp:enabling privacy-preserving location proofs for mobile users[J]. IEEE/ACM Transactions on Networking, 2016,24(6): 3276-3289. |
[22] | FAWAZ K , SHIN K . Location privacy protection for smartphone users[C]// CCS. 2014. |
[23] | SHOKRI R , THEODORAKOPOULOS G , TRONCOSO C ,et al. Protecting location privacy:optimal strategy against localization attacks[C]// CCS. 2012. |
[24] | GOTE M , NATH S , GEHRKE J . Maskit:privately releasing user context streams for personalized mobile applications[C]// SIGMOD. 2012. |
[25] | SHOKRI R , THEODORAKOPOULOS G , BOUDEC J ,et al. Hubaux.Quantifying location privacy[C]// SP. 2011. |
[26] | ZHENG Y , XIE X , MA W . Geolife:a collaborative social networking service among user,location and trajectory[C]// Data Eng.Bull. 2010. |
[27] | CHO E , MYERS S , LESKOVEC J . Friendship and mobility:user movement in location-based social networks[C]// KDD. 2011. |
[28] | PINGLEY A , ZHANG N , FU X ,et al. Protection of query privacy for continuous location based services[C]// INFOCOM. 2011. |
[29] | NIU B , ZHU X , LI W ,et al. A personalized two-tier cloaking scheme for privacy aware location-based services[C]// ICNC. 2015. |
[1] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[2] | Shengxing YU, Zhong CHEN. Efficient secure federated learning aggregation framework based on homomorphic encryption [J]. Journal on Communications, 2023, 44(1): 14-28. |
[3] | Xuan WANG, Yu ZHANG, Junfeng ZHOU, Ziyang CHEN. Influence maximization algorithm based on social network [J]. Journal on Communications, 2022, 43(8): 151-163. |
[4] | Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE. Privacy-preserving trajectory similarity computation method [J]. Journal on Communications, 2022, 43(11): 1-13. |
[5] | Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao. Privacy-preserving precise profile matching in mobile social network [J]. Journal on Communications, 2022, 43(11): 90-103. |
[6] | Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG. Privacy-preserving attribute ticket scheme based on mobile terminal with smart card [J]. Journal on Communications, 2022, 43(10): 26-41. |
[7] | Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN. Towards edge-collaborative, lightweight and privacy-preserving classification framework [J]. Journal on Communications, 2022, 43(1): 127-137. |
[8] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[9] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[10] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[11] | Jiaqi WANG,Ning LU,Qingfeng CHENG,Zhaoxia WU,Wenbo SHI. Privacy-preserving multi-attribute reverse spectrum auction scheme [J]. Journal on Communications, 2020, 41(9): 77-91. |
[12] | Yousheng ZHOU,Chang TAN,Fei TANG. Multi-dimensional secure query scheme for fog-enhanced IIoT [J]. Journal on Communications, 2020, 41(8): 175-186. |
[13] | Jiayin LI,Wenzhong GUO,Xiaoyan LI,Ximeng LIU. Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic [J]. Journal on Communications, 2020, 41(7): 73-83. |
[14] | Ming LI,Xiaopeng YANG,Hui ZHU,Fengwei WANG,Qi LI. Efficient and privacy-preserving online face authentication scheme [J]. Journal on Communications, 2020, 41(5): 205-214. |
[15] | Ayong YE,Lingyu MENG,Ziwen ZHAO,Yiqing DIAO,Jiaomei ZHANG. Trajectory differential privacy protection mechanism based on prediction and sliding window [J]. Journal on Communications, 2020, 41(4): 123-133. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|