Journal on Communications ›› 2017, Vol. 38 ›› Issue (6): 148-157.doi: 10.11959/j.issn.1000-436x.2017129
• Correspondences • Previous Articles Next Articles
Lu-lu LI1,Jia-feng HUA2,Sheng WAN2,Hui ZHU2,Feng-hua LI2
Revised:
2017-03-10
Online:
2017-06-25
Published:
2017-06-30
Supported by:
CLC Number:
Lu-lu LI,Jia-feng HUA,Sheng WAN,Hui ZHU,Feng-hua LI. Achieving efficient location privacy protection based on cache[J]. Journal on Communications, 2017, 38(6): 148-157.
[1] | GRUSTER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// International Conference on Mobile Systems. 2013: 31-42. |
[2] | MOKBEL M F , CHOW C Y , AREF W G . The new casper:query processing for location services without compromising privacy[C]// The 32nd International Conference on Very Large Data Bases. Seoul,South Korea, 2006: 763-774. |
[3] | XU T , CAI Y . Feeling-based location privacy protection for location-based services[C]// ACM Conference on Computer &Communications Security(CCS). 2009: 348-357. |
[4] | CHOW C , MOKEL M F , LIU X . A peer to peer spatial cloaking algorithm for anonymous location based service[C]// The 14th ACM International Symposium on Geographic Information Systems. 2006: 171-178. |
[5] | PAVEL S , FRANK D , KURT R . Map-aware position sharing for location privacy in non-trusted systems[C]// The 10th International Conference Pervasive Computing. Newcastle England, 2012: 388-405. |
[6] | 徐建, 黄孝喜, 郭鸣 ,等. 动态 P2P 网络中基于匿名链的位置隐私保护[J]. 浙江大学学报(工学版), 2012,46(4): 712-718. |
XU J , HUANG X X , GUO M ,et al. Location privacy through an anonymous chain in dynamic P2P network[J]. Journal of Zhejiang University(Engineering Science), 2012,46(4): 712-718. | |
[7] | CHENG R , ZHANG Y , BERTINO E ,et al. Preserving user location privacy in mobile data management infrastructures[C]// Privacy Enhancing Technology Workshop (PET’ 06). Cambridge,United Kingdom, 2006: 393-412. |
[8] | ANDERSEN M S , KJAERGAARD M B . Towards a new classification of location privacy methods in pervasive computing[J]. Social Informatics and Telecommunications Engineering, 2012,104: 150-161. |
[9] | TRONG N P , TRAN K D . A novel trajectory privacy-preserving future time index structure in moving object databases[C]// The 3th International Conference on Computer and Computational Intelligence. 2012: 124-134. |
[10] | 魏志强, 康密军, 贾东宁 ,等. 普适计算隐私保护策略研究[J]. 计算机学报, 2010,33(1): 128-138. |
WEI Z Q , KANG M J , JIA D N ,et al. Research on privacy protection policy for pervasive computing[J]. Chinese Journal of Computers, 2010,33(1): 128-138. | |
[11] | YI X , PAULET R , BERTINO E ,et al. Practical approximate k nearest neighbor queries with location and query privacy[J]. IEEE Transactions on Knowledge and Data Engineering, 2016,(99): 1-14. |
[12] | PAULET R , KAOSAR M G , YI X ,et al. Privacy-preserving and content-protecting location based queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(5): 1200-1210. |
[13] | GHINITA G , KALNIS P , KHOSHGOZARAN A ,et al. Privacy queries in location based services:anonymizers are not necessary[C]// The 27th ACM Conference on Management of Data(SIGMOD’08). 2008: 121-132. |
[14] | HU H , LU R X , HUANG C ,et al. An efficient privacy-preserving location based services query scheme in outsourced cloud[J]. IEEE Transactions on Vehicular Technology, 2016,65(9): 7729-7739. |
[15] | ZHU H , LIU F , LI H . Efficient and privacy-preserving polygons spatial query framework for location-based services[J]. IEEE Internet of Things Journal, 2015,(99): 1-1. |
[16] | 毛典辉, 曹健, 蔡强 ,等. 情景感知的位置隐私保护方法研究进展[J]. 通信学报, 2013,34(Z1): 230-234. |
MAO D H , CAO J , CAI Q ,et al. Survey of the context-aware location privacy-preserving techniques[J]. Journal on Communications, 2013,34(Z1): 230-234. | |
[17] | GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st International Conference on Mobile Systems Applications and Services. USA, 2003: 31-42 |
[18] | YIU M L , JENSEN C S , HUANG X ,et al. SpaceTwist:managing the trade-offs among location privacy,query performance,and query accuracy in mobile services[C]// The IEEE International Conference on Data Engineering. 2008: 366-375. |
[19] | CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based services[C]// The 14th ACM International Symposium on Advances in Geographic Information Systems(ACM-GIS’06). 2006: 171-178. |
[20] | KIDO H , YANGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services[C]// The 2nd IEEE International Conference on Pervasive Services(ICPS'05). 2005: 88-97. |
[21] | NIU B , LI Q H , ZHU X Y ,et al. Achieving k-anonymity in privacy-aware location-based services[C]// The IEEE 33th International Conference on Computer Communications (INFOCOM’14). 2014: 754-762. |
[22] | 霍峥, 孟小峰, 黄毅 . PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J]. 计算机学报, 2013,36(4): 716-726. |
HUO Z , MENG X F , HUANG Y . PrivateCheckIn:trajectory privacy-preserving for check-in services in MSNS[J]. Chinese Journal of Computers, 2013,36(4): 716-726. | |
[23] | AMINI S , LINDQVIST J , HONG J ,et al. Cache:caching location-enhanced content to improve user privacy[J]. ACM Sigmobile Computing &Communication Review, 2010,14(3): 19-21. |
[24] | SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATOS P ,et al. Hiding in the mobile crowd:location privacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2013,11(3): 266-279. |
[25] | ZHU X Y , CHI H T , NIU B ,et al. Mobicache:when k-anonymity meets cache[C]// IEEE Global Communication Conference (GLOBECOM). 2013: 820-825. |
[26] | NIU B , ZHU X Y , LI W H ,et al. EPcloak:an efficient and privacy-preserving spatial cloaking scheme for LBSs[C]// The 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems(MASS’14). 2014: 398-406. |
[27] | NIU B , LI Q H , ZHU X Y ,et al. Enhancing privacy through caching in location-based services[C]// The IEEE 34th International Conference on Computer Communications (INFOCOM’15). 2015: 1017-1025. |
[28] | 西格兰·托比 . 集体智慧编程[M]. 北京: 电子工业出版社, 2009: 89-91. |
SEGRAN T . Programming collective intelligence[M]. Beijing: Publishing House of Electronics IndustryPress, 2009: 89-91. |
[1] | Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA. Byzantine-robust federated learning over Non-IID data [J]. Journal on Communications, 2023, 44(6): 138-153. |
[2] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[3] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[4] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[5] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[6] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[7] | Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG. Efficient strong privacy protection and transferable attribute-based ticket scheme [J]. Journal on Communications, 2022, 43(3): 63-75. |
[8] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[9] | Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG. Privacy protection of warning message publishing protocol in VANET [J]. Journal on Communications, 2021, 42(8): 120-129. |
[10] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[11] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
[12] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[13] | Guangjun LIU, Wangmei GUO, Jinbo XIONG, Ximeng LIU, Changyu DONG. Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage [J]. Journal on Communications, 2021, 42(7): 220-230. |
[14] | Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU. Android application privacy protection mechanism based on virtual machine bytecode injection [J]. Journal on Communications, 2021, 42(6): 171-181. |
[15] | Youhuizi LI, Yuyu YIN, Honghao GAO, Yi JIN, Xinheng WANG. Survey on privacy protection in non-aggregated data sharing [J]. Journal on Communications, 2021, 42(6): 195-212. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|