2010
DOI: 10.1109/tpds.2010.26
|View full text |Cite
|
Sign up to set email alerts
|

2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
26
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(26 citation statements)
references
References 29 publications
0
26
0
Order By: Relevance
“…To address this issue, Hossain et al [12] proposed H-Star based cloaking algorithm that can achieve high successful rate and reduce query processing cost. To the best of our knowledge, there exists only one research on result-aware location cloaking approach (called 2PASS), proposed by H. Hu and J. Xu [21]; based on client-server model that minimizes the number of requested objects directly. For this, they introduced (ì) weighted adjacency graph (WAG) that stores voronoi cell information and (ìì) WAG-tree indexing for computing the objects to request from the server.…”
Section: Cloaking-based Techniquementioning
confidence: 99%
See 3 more Smart Citations
“…To address this issue, Hossain et al [12] proposed H-Star based cloaking algorithm that can achieve high successful rate and reduce query processing cost. To the best of our knowledge, there exists only one research on result-aware location cloaking approach (called 2PASS), proposed by H. Hu and J. Xu [21]; based on client-server model that minimizes the number of requested objects directly. For this, they introduced (ì) weighted adjacency graph (WAG) that stores voronoi cell information and (ìì) WAG-tree indexing for computing the objects to request from the server.…”
Section: Cloaking-based Techniquementioning
confidence: 99%
“…Basically, 2PASS [21] is based on the notion of voronoi cells and each cell contains one object that is the nearest neighbor of any point in its cell. For example, Figure 3 triangulation of the space because these lines divide the space into partitions of spatial shape-triangles.…”
Section: Cloaking-based Techniquementioning
confidence: 99%
See 2 more Smart Citations
“…It tries to blur a user's exact location by generating a cloaking region which includes a query issuer and k-1 other users. Current research aligns on developing techniques to elaborate on k-anonymity [3][4][5][6][7][8]15] that process a user's query with protecting privacy during the access of LBSs. However, these kinds of approaches always rely on a location anonymizer to enlarge the cloaking region.…”
Section: Introductionmentioning
confidence: 99%