2021
DOI: 10.3390/app11104594
|View full text |Cite
|
Sign up to set email alerts
|

A Location Privacy Preservation Method Based on Dummy Locations in Internet of Vehicles

Abstract: During the procedure, a location-based service (LBS) query, the real location provided by the vehicle user may results in the disclosure of vehicle location privacy. Moreover, the point of interest retrieval service requires high accuracy of location information. However, some privacy preservation methods based on anonymity or obfuscation will affect the service quality. Hence, we study the location privacy-preserving method based on dummy locations in this paper. We propose a vehicle location privacy-preserva… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 34 publications
0
11
0
Order By: Relevance
“…The vehicle user uses the dummy location selection algorithm under road restriction (RR-DLS) [51] to generate dummy locations.…”
Section: Dummy Locations Generation Algorithmmentioning
confidence: 99%
“…The vehicle user uses the dummy location selection algorithm under road restriction (RR-DLS) [51] to generate dummy locations.…”
Section: Dummy Locations Generation Algorithmmentioning
confidence: 99%
“…Instead of modifying the actual locations, another implementation of location perturbation is to combine the actual location with some indistinguishable dummy locations. For instance, to protect the actual locations of drivers on the internet of vehicles from being revealed by road restriction, Xu et al [16] propose a dummy-generation based location perturbation methods. The perturbed location sent to the data analyzer is composed of the actual location and several nearby fake locations following the road restriction, so it is hard for the adversary to distinguish the actual location from the dummies.…”
Section: Location Perturbationmentioning
confidence: 99%
“…Reference Characteristic k-anonymity [13,28] flexible and easy to implement; lack of location accuracy l-diversity [31,32,35] k-anonymity method considering road network Caching scheme [15,24] accurate location; not applicable for real-time service Dummy location [16,25] accurate location; false location data causing resource waste Homomorphic encryption [17,26,27] ciphertext can be calculated; high computation cost Differential privacy [18][19][20] strict proof of privacy assessment…”
Section: Privacy Preservation Mechanismmentioning
confidence: 99%
“…In order to solve this problem, many studies focused on addressing how to protect privacy in LBS during the past several years based on location obfuscation and encryption [12], such as k-anonymity [13], mixed zone [14], caching [15], dummy locations [16], homomorphic encryption [17] and differential privacy [18][19][20]. Among them, the most classic location privacy preservation scheme is k-anonymity.…”
Section: Introductionmentioning
confidence: 99%