2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing 2010
DOI: 10.1109/nswctc.2010.243
|View full text |Cite
|
Sign up to set email alerts
|

A Distributed Spatial Cloaking Protocol for Location Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 4 publications
0
12
0
1
Order By: Relevance
“…Spatial cloaking method [2][3][4][5] , analyze cumulated distribution and calculate the average of distance between user's query point Q and each POI in the results. As shown in Fig.…”
Section: Precision Of Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Spatial cloaking method [2][3][4][5] , analyze cumulated distribution and calculate the average of distance between user's query point Q and each POI in the results. As shown in Fig.…”
Section: Precision Of Resultsmentioning
confidence: 99%
“…Existing approaches for user query anonymization in LBS can be roughly grouped into the following five classes: (1) Cloaking 2-5, 11-13 , (2) Obfuscation 14, 15 (3) False Locations 4, 23 (4) Space Transformation [6][7] , and (5) Dummies [16][17][18] .…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Due the presence of hidden clauses and unsaid policies, this method could not serve the objective of user privacy efficiently for long and as LBS users grew drastically over the years there was a need to have a better and foolproof mechanism. Authors in [18,19] propose the idea of distributed peerto-peer communication among mobile users that can freely talk to each other. In this framework, dependence on the third party is eliminated and mobile users are allowed to form an ad hoc network out of which one mobile client is randomly selected as the agent to carry out the communication between querier and LBS server [16].…”
Section: Related Workmentioning
confidence: 99%
“…H.Zhang and X Mingjun [16] proposed distributed spatial cloaking in which distributed anonymity having location information for cloaking. Distributed anonymity can handle frequent requests from users without being bottlenecked.…”
Section: Literature Reviewmentioning
confidence: 99%