Journal on Communications ›› 2015, Vol. 36 ›› Issue (4): 126-136.doi: 10.11959/j.issn.1000-436x.2015160
• academic paper • Previous Articles Next Articles
Chang-li ZHOU,Chun-guang MA,Song-tao YANG
Online:
2015-04-25
Published:
2015-04-15
Supported by:
Chang-li ZHOU,Chun-guang MA,Song-tao YANG. Research of LBS privacy preserving based on sensitive location diversity[J]. Journal on Communications, 2015, 36(4): 126-136.
[1] | GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[A]. Proceedings of the 1st International Conference on Mobile Systems,Applications and Services[C]. 2003. 31-42. |
[2] | NIU B , LI Q , ZHU X ,et al. Achieving k-anonymity in privacy-aware location-based services[A]. Proc IEEE INFOCOM[C]. 2014. 754-762. |
[3] | GHINITA G . Privacy for location-based services[J]. Synthesis Lectures on Information Security,Privacy,& Trust, 2013,4(1): 1-85. |
[4] | BAMBA B , LIU L , PESTI P ,et al. Supporting anonymous location queries in mobile environments with privacygrid[A]. Proceedings of the 17th International Conference on World Wide Web[C]. 2008. 237-246. |
[5] | 徐建, 徐明, 林欣等 . 路网限制环境中基于匿名蜂窝的位置隐私保护[J]. 浙江大学学报 (工学版), 2011,3: 006. XU J , XU M , LIN X ,et al. Location privacy protection through anonymous cells in road network[J]. Journal of Zhejiang University (Engineering Science), 2011,3: 006. |
[6] | DONDI R , MAURI G , ZOPPIS I . The l-diversity problem:tractability and approximability[J]. Theoretical Computer Science, 2013,511: 159-171. |
[7] | KIDO H , YANAGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services[A]. Pervasive Services,ICPS'05,Proceedings International Conference[C]. 2005. 88-97. |
[8] | NIU B , ZHANG Z , LI X ,et al. Privacy-area aware dummy generation algorithms for location-based services[A]. Communications (ICC),2014 IEEE International Conference[C]. 2014. 957-962. |
[9] | HONG J I , LANDAY J A . An architecture for privacy-sensitive ubiquitous computing[A]. Proceedings of the 2nd International Conference on Mobile Systems,Applications,and Services[C]. 2004. 177-189. |
[10] | YIU M L , JENSEN C S , HUANG X ,et al. Spacetwist:managing the trade-offs among location privacy,query performance,and query accuracy in mobile services[A]. Data Engineering,ICDE 2008,IEEE 24th International Conference[C]. 2008. 366-375. |
[11] | 杨松涛, 马春光, 周长利 . 面向LBS的隐私保护模型及方案[J]. 通信学报, 2014,35(8): 116-124. YANG S T , MA C G , ZHOU C L . LBS-oriented location privacy protection model and scheme[J].Journal on Communications, 2014,35(8): 116-124. |
[12] | HUO Z , MENG X , HU H ,et al. You can walk alone:trajectory privacy-preserving through significant stays protection[A]. Database Systems for Advanced Applications[C]. Springer Berlin Heidelberg, 2012. 351-366. |
[13] | MOKBEL M F . Towards privacy-aware location-based database servers[A]. Data Engineering Workshops,Proceedings,22nd International Conference[C]. 2006. 93-93. |
[14] | CHOW C Y , MOKBEL M F , LIU X . Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J]. GeoInformatica, 2011,15(2): 351-380. |
[15] | 薛姣, 刘向宇, 杨晓春 ,等. 一种面向公路网络的位置隐私保护方法[J]. 计算机学报, 2011,34(5): 865-878. XUE J , LIU X Y , YANG X C ,et al. A location privacy preserving approach on road network[J]. Chinese Journal of Computers, 2011,34(5): 865-878. |
[16] | 黄毅, 霍峥, 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报, 2011,34(10): 1976-1985. HANG Y , HUO Z , MENG X F . CoPrivacy:a collaborative location privacy-preserving method without cloaking region[J]. Chinese Journal of Computers, 2011,34(10): 1976-1985. |
[17] | GONG Z , SUN G Z , XIE X . Protecting privacy in location-based services using k-anonymity without cloaked region[A]. Mobile Data Management (MDM),2010 Eleventh International Conference[C]. 2010. 366-371. |
[18] | CHOW C Y , MOKBEL M F . Trajectory privacy in location-based services and data publication[J]. ACM SIGKDD Explorations Newsletter, 2011,13(1): 19-29. |
[19] | 毛典辉, 蔡强, 李海生 ,等. 路网条件下基于用户协作的LBS隐私保护[J]. 高技术通讯, 2013,23(11): 1148-1153. MAO D H , CAI Q , LI H S ,et al. A collaborative LBS privacy protective method in road-network[J]. Chinese High Technology Letters, 2013,23(11): 1148-1153. |
[20] | ZHU Z , CAO G . Applaus:a privacy-preserving location proof updating system for location-based services[A]. INFOCOM,2011 Proceedings IEEE[C]. 2011. 1889-1897. |
[1] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[2] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[3] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[4] | Ayong YE,Lingyu MENG,Ziwen ZHAO,Yiqing DIAO,Jiaomei ZHANG. Trajectory differential privacy protection mechanism based on prediction and sliding window [J]. Journal on Communications, 2020, 41(4): 123-133. |
[5] | Jie WANG,Chunru WANG,Jianfeng MA,Hongtao LI. Dummy location selection algorithm based on location semantics and query probability [J]. Journal on Communications, 2020, 41(3): 53-61. |
[6] | Weihao LI,Jin CAO,Hui LI. Privacy self-correlation privacy-preserving scheme in LBS [J]. Journal on Communications, 2019, 40(5): 57-66. |
[7] | Wenjing ZHANG,Qiao LIU,Hui ZHU. Evaluation and protection of multi-level location privacy based on an information theoretic approach [J]. Journal on Communications, 2019, 40(12): 51-59. |
[8] | Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS [J]. Journal on Communications, 2018, 39(5): 134-142. |
[9] | Qian ZHOU,Xiaolin QIN,Youwei DING. Preserving source-location privacy efficiently based on attack-perceiving in wireless sensor network [J]. Journal on Communications, 2018, 39(1): 101-116. |
[10] | Zhen-peng LIU,Xuan ZHAO,Ya-wei DONG,Bin ZHANG. Improved SpaceTwist privacy protection method based on anchor optimization algorithm [J]. Journal on Communications, 2017, 38(Z1): 32-38. |
[11] | Lei ZHANG,Chun-guang MA,Song-tao YANG,Zeng-peng LI. CP-ABE based users collaborative privacy protection scheme for continuous query [J]. Journal on Communications, 2017, 38(9): 76-85. |
[12] | Zhuo-xiong PEI,Xing-hua LI,Hai LIU,Kai-yue LEI,Jian-feng MA,Hui LI. Anonymizing region construction scheme based on query range in location-based service privacy protection [J]. Journal on Communications, 2017, 38(9): 125-132. |
[13] | Nan SHEN,Chun-fu JIA,Shuang LIANG,Rui-qi LI,Zhe-li LIU. Approach of location privacy protection based on order preserving encryption of the grid [J]. Journal on Communications, 2017, 38(7): 78-88. |
[14] | Chang-li ZHOU,Hui TIAN,Chun-guang MA,Song-tao YANG. Research on LBS privacy preservation based on pseudorandom permutation in road network [J]. Journal on Communications, 2017, 38(6): 19-29. |
[15] | Lian-suo WEI,Shao-bin CAI,Shi PAN. Research on mobile strategy of anchor node based on weighted virtual force model [J]. Journal on Communications, 2017, 38(6): 97-107. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|