2011
DOI: 10.7840/kics.2011.36b.8.929
|View full text |Cite
|
Sign up to set email alerts
|

A Design of Cloaking Region using Dummy for Privacy Information Protection on Location-Based Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…The new Casper proposed by Mokbel describes the four elements that satisfy regional anonymity: accuracy, quality, efficiency, and flexibility 10 . Kim et al 16 protected the privacy information from the LBS by designing a cloaking technique using dummies. This technique solved the duplicate building count problem by adding a building group item to the index structure of the privacy grid and overcame the privacy information protection and leakage problem—caused by the setup of minimum CR—by increasing the k value after searching the cells adjacent to the edges of each building.…”
Section: Related Workmentioning
confidence: 99%
“…The new Casper proposed by Mokbel describes the four elements that satisfy regional anonymity: accuracy, quality, efficiency, and flexibility 10 . Kim et al 16 protected the privacy information from the LBS by designing a cloaking technique using dummies. This technique solved the duplicate building count problem by adding a building group item to the index structure of the privacy grid and overcame the privacy information protection and leakage problem—caused by the setup of minimum CR—by increasing the k value after searching the cells adjacent to the edges of each building.…”
Section: Related Workmentioning
confidence: 99%
“…Cloaking and -anonymity are the most commonly used forms of location anonymization [10][11][12][13][14][15][16][17][18][19][20][21][22]. Figure 1 depicts an example of the distributed grid based continuous cloaking (DGCC) area creation when the required -anonymity level is 4 (e.g., = 4) [23].…”
Section: Related Workmentioning
confidence: 99%
“…It satisfies the four requirements of location anonymity: accuracy, quality, efficiency, and flexibility. The cloaking algorithm in [13] employs dummy generation in creating a CR. To solve the building double counting problem, it adds the building grouping item to the index structure of the existing privacy grid approach and minimizes the CR by finding users (e.g., -anonymity) in the grid cells adjacent to the buildings in the CR.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations