Journal on Communications ›› 2013, Vol. 34 ›› Issue (Z1): 230-234.doi: 10.3969/j.issn.1000-436x.2013.z1.030
• Technical Report • Previous Articles Next Articles
Dian-hui MAO,Jian CAO,Qiang CAI,Hai-sheng LI
Online:
2013-08-25
Published:
2017-06-23
Supported by:
Dian-hui MAO,Jian CAO,Qiang CAI,Hai-sheng LI. Survey of the context-aware location privacy-preserving techniques[J]. Journal on Communications, 2013, 34(Z1): 230-234.
[1] | WEI W , XU F Y , LI Q . Mobishare: flexible privacy preserving loca-tion sharing in mobile online social networks[A]. Proceedings of IN-FOCOM 2012[C]. Orlando, USA, 2012.2616-2620. |
[2] | SHIN K G , JU X E , CHEN Z G , et al. Privacy protection for users of location-based services[J]. Wireless Communications, 2012,19 (1):30-39. |
[3] | 周傲英, 杨彬, 金澈清 等. 基于位置的服务:架构与进展[J]. 计算机学报, 2011,34(7):1155-1171. ZHOU A Y , YANG B , JIN C Q , et al. Location-based services: archi-tecture and progress[J]. Chinese Journal of Computers, 2011,34(7):1155-1171. |
[4] | 霍峥, 孟小峰 . 轨迹隐私保护技术研究[J]. 计算机学报, 2011,34(10):1820-1830. HUO Z , MENG X F . A survey of trajectory privacy preserving tech-niques[J]. Chinese Journal of Computers, 2011,34(10):1820-1830. |
[5] | ANIKET P , YU W , ZHANG N , et al. A context-aware scheme for privacy preserving location-based services[J]. Computer Networks, 2012,56 (11):2551-2568. |
[6] | CHOW C Y , MOKBEL M , HE T . A privacy preserving location moni-toring system for wireless sensor networks[J]. IEEE Transactions on Mobile Computing, 2011,10 (1):94-107. |
[7] | 刘昭斌, 刘文芝, 顾君忠 . 位置感知的自适应隐私保护策略[J]. 计算机工程与设计, 2011,32(3):839-841. LIU Z B , LIU W Z , GU J Z . Adaptive privacy protection policy of lo-cation-aware[J]. Computer Engineering and Design, 2011,32(3):839-841. |
[8] | ANDERSEN M S , KJAERGAARD M B . Towards a new classifica-tion of location privacy methods in pervasive computing[J]. Social In-formatics and Telecommunications Engineering, 2012,104:150-161. |
[9] | 魏志强, 康密军, 贾东宁 等. 普适计算隐私保护策略研究[J]. 计算机学报, 2010,33(1):128-138. WEI Z Q , KANG M J , JIA D N , et al. Research on privacy protection policy for pervasive computing[J]. Chinese Journal of Computers, 2010,33(1):128-138. |
[10] | TRONG N P , TRAN K D . A novel trajectory privacy-preserving future time index structure in moving object databases[A]. Proceedings of the 3th International Conference on Computer and Computational Intelli-gence[C]. Buenos Aives, Argentina, 2012.124-134. |
[11] | GRUTESER M , GRUNWALD D . Anonymous usage of location-based Services through spatial and temporal cloaking[A]. Proceedings of the 1st International Conference on Mobile Systems Applications and Ser-vices[C]. San Francisco, USA, 2003.31-42. |
[12] | YIU M L , JENSEN C S , HUANG X , et al. Spacetwist: managing the trade-offs among location privacy, query performance, and query ac-curacy in mobile services[A]. Proceedings of the IEEE International Conference on Data Engineering 2008[C]. Cancun, Mexico, 2008.366-375. |
[13] | 林欣, 李善平, 杨朝晖 . LBS中连续查询攻击算法及匿名性度量[J]. 软件学报, 2009,20(4):1058-1068. LIN X , LI S P , YANG Z H . attacking algorithms against continuous queries in LBS and anonymity measurement[J]. Journal of Software, 2009,20(4):1058-1068. |
[14] | 宋金玲, 刘国华, 黄立明 等. k-匿名隐私保护模型中k值的优化选择算法[J]. 小型微型计算机系统, 2011,32(10):1987-1983. SONG J L , LIU G H , HUANG L M , et al. Selection algorithm for op-timized k-values in k-anonymity model[J]. Journal of Chinese Com-puter Systems, 2011,32(10):1987-1983. |
[15] | 黄毅, 霍峥, 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报, 2011,34(10):1975-1985. HUANG Y , HUO Z , MENG X F , . CoPrivacy: a collaborative location privacy preserving method without cloaking region[J]. Chinese Jour-nal of Computers, 2011,34(10):1975-1985. |
[16] | PAN X , XU J , MENG X F . Protecting location privacy against loca-tion-dependent attack in mobile services[A]. Proceedings of the ACM Conference on Information and Knowledge Management 2008[C]. Napa Valley, USA, 2008.1475-1476. |
[17] | GONG Z , SUN G , XIE X . Protecting privacy in location-based ser-vices using k-anonymity without cloaked region[A]. Proceedings of the International Conference on Mobile Data Management 2010[C]. Kan-sas, USA, 2010.366-371. |
[18] | 潘晓, 郝兴, 孟小峰 . 基于位置服务中的连续查询隐私保护研究[J]. 计算机研究与发展, 2010,47(1):121-129. PAN X , HAO X , MENG X F . Privacy preserving towards continuous query in location-based services[J]. Journal of Computer Research and Development, 2010,47(1):121-129. |
[19] | 薛姣, 刘向宇, 杨晓春 等. 一种面向公路网络的位置隐私保护方法[J]. 计算机学报, 2011,34(5):865-878. XUE J , LIU X Y , YANG X C , et al. A location privacy preserving ap-proach on road network[J]. Chinese Journal of Computers, 2011,34(5):865-878. |
[20] | PALANISAMY B , LIU L , LEE K S , et al. Location privacy with road network mix-zones[A]. Proceedings of the 8th IEEE International Conference on Mobile Ad-hoc and Sensor Networks[C]. Chengdu, China, 2012.124-131. |
[21] | MOKBEL M F , CHOW C Y , AREF W G . The new casper: query processing for location services without compromising privacy[A]. Proceedings of the 32nd International Conference on Very Large Data Bases[C]. Seoul, South Korea, 2006.763-774. |
[22] | 徐建, 黄孝喜, 郭鸣 等. 动态P2P网络中基于匿名链的位置隐私保护[J]. 浙江大学学报(工学版), 2012,46(4):712-718. XU J , HUANG X X , GUO M , et al. Location privacy through an anonymous chain in dynamic P2P network[J]. Journal of Zhejiang University (Engineering Science), 2012,46(4):712-718. |
[23] | CHOW C , MOKEL M F , LIU X . A peer to peer spatial cloaking algo-rithm for anonymous location based service[A]. Proceedings of 14th ACM international symposium on geographic information systems[C]. Arlington, USA, 2006.171-178. |
[24] | PAVELS , FRANK D , KURT R . Map-aware position sharing for loca-tion privacy in non-trusted systems[A]. Proceedings of the 10th Inter-national Conference Pervasive Computing[C]. Newcastle, England, 2012.388-405. |
[25] | 刘恒 . 普适计算环境下基于位置服务的隐私保护若干技术研究[D]. 西安: 西安电子科技大学, 2010. LIU H . Research on Key Techniques in Privacy of Location Based Service for Pervasive Computing[D]. Xi'an: University of Electronic Science and Technology of China, 2010. |
[26] | 邵非 . 基于位置感知的移动信息服务若干关键技术研究[D]. 上海: 华东师范大学, 2011. SHAO F . Research on Some Key Issues of Location Awareness based mobile information service[D]. Shanghai: East China Normal Univer-sity, 2011. |
[27] | WANG Y , XU D B , HE X , et al. L2P2: location aware location privacy protection for location-based services[A]. Proceedings of INFO-COM'2012[C]. Orlando, USA, 2012.1996-2004. |
[28] | 毛典辉, 蔡强, 李海生 等. 用户协作模式下自适应情境的LBS隐私保护方法[J]. 四川大学学报(工程科学版), 2013,45(4):75-80. MAO D H , CAI Q , LI H S , et al. An adaptive context aware LBS pri-vacy protection method based on users collaboration[J]. Journal of Si-chuan University (Engineering Science), 2013,45(4):75-80. |
[29] | FARZANA R , MD E H , FERDAUS A K , et al. User privacy protec-tion in pervasive social networking applications using PCO[J]. Inter-national Journal of Social Computing and Cyber-Physical Systems, 2012,1 (3):242-267. |
[30] | 周傲英, 金澈清, 王国仁 等. 不确定性数据管理技术研究综述[J]. 计算机学报, 2009,32(1):1-16. ZHOU A Y , JIN C Q , WANG G R , et al. A survey on the management of uncertain data[J]. Chinese Journal of Computers, 2009,32(1):1-16. |
[31] | XU J , TANG X , HU H , et al. Privacy-conscious location-based queries in mobile environments[J]. IEEE Transactions on Parallel and Distrib-uted Systems, 2010,21 (3):313-326. |
[32] | YIU M L , CHRISTIAN S , JENSEN M L , et al. Design and analysis of a ranking approach to private location-based services[J]. ACM Trans-actions on Database Systems, 2011,36 (2):1-42. |
[1] | Peng QIN, Haoting HE, Xiongwen ZHAO, Yang FU, Yu ZHANG, Miao WANG, Shuo WANG, Xue WU. Efficient resource allocation with context-awareness for parked car road side unit-based Internet of vehicles [J]. Journal on Communications, 2022, 43(7): 113-125. |
[2] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[3] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[4] | Chen FANG, Yuanbo GUO, Yifeng WANG, Yongjin HU, Jiali MA, Han ZHANG, Yangyang HU. Edge computing privacy protection method based on blockchain and federated learning [J]. Journal on Communications, 2021, 42(11): 28-40. |
[5] | Ayong YE,Lingyu MENG,Ziwen ZHAO,Yiqing DIAO,Jiaomei ZHANG. Trajectory differential privacy protection mechanism based on prediction and sliding window [J]. Journal on Communications, 2020, 41(4): 123-133. |
[6] | Jie WANG,Chunru WANG,Jianfeng MA,Hongtao LI. Dummy location selection algorithm based on location semantics and query probability [J]. Journal on Communications, 2020, 41(3): 53-61. |
[7] | Zhu WANG,Kun HE,Xinyu WANG,Ben NIU,Fenghua LI. Traffic characteristic based privacy leakage assessment scheme for Android device [J]. Journal on Communications, 2020, 41(2): 155-164. |
[8] | Weihao LI,Jin CAO,Hui LI. Privacy self-correlation privacy-preserving scheme in LBS [J]. Journal on Communications, 2019, 40(5): 57-66. |
[9] | Wenjing ZHANG,Qiao LIU,Hui ZHU. Evaluation and protection of multi-level location privacy based on an information theoretic approach [J]. Journal on Communications, 2019, 40(12): 51-59. |
[10] | Yuanzhi YAO,Feng WANG,Wenbo YAN,Nenghai YU. Image privacy preservation scheme based on QR code and reversible visible watermarking [J]. Journal on Communications, 2019, 40(11): 65-75. |
[11] | Yatao YANG,Xinguang HAN,Jierun HUANG,Yang ZHAO. Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE [J]. Journal on Communications, 2019, 40(11): 180-186. |
[12] | Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS [J]. Journal on Communications, 2018, 39(5): 134-142. |
[13] | Xiaoying ZHANG,Hui PENG,Hong CHEN. State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks [J]. Journal on Communications, 2018, 39(10): 130-142. |
[14] | Qian ZHOU,Xiaolin QIN,Youwei DING. Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network [J]. Journal on Communications, 2018, 39(1): 101-116. |
[15] | Nan SHEN,Chun-fu JIA,Shuang LIANG,Rui-qi LI,Zhe-li LIU. Approach of location privacy protection based on order preserving encryption of the grid [J]. Journal on Communications, 2017, 38(7): 78-88. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|