2009 11th IEEE International Conference on High Performance Computing and Communications 2009
DOI: 10.1109/hpcc.2009.47
|View full text |Cite
|
Sign up to set email alerts
|

A New Grid-Based Cloaking Algorithm for Privacy Protection in Location-Based Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…The existing cloaking methods with k-anonymity [6,7,8,9,10,11,14,15] don't protect user privacy to support continuous queries. While making cloaking region for each time, the methods include different group of k-1 users so that the unauthorized users are able to detect the query issuer.…”
Section: Related Workmentioning
confidence: 98%
“…The existing cloaking methods with k-anonymity [6,7,8,9,10,11,14,15] don't protect user privacy to support continuous queries. While making cloaking region for each time, the methods include different group of k-1 users so that the unauthorized users are able to detect the query issuer.…”
Section: Related Workmentioning
confidence: 98%
“…However, a real-time LBS service cannot tolerate any delay of service requests such as in real-time traffic reporting. Although there are some new cloaking methods that have been proposed recently [7,31,32,43,44,50], the basic idea is still adding a third trusted party server to cloak the query before a request for LBS is sent to a provider, the location data in the request is replaced with a cloaked version, which may match at least k mobile devices. An adversary will not be able to determine from the cloaked location which of the k users has originated that request.…”
Section: Literature Reviewmentioning
confidence: 99%
“…First of all, our algorithm adds p 1 and p 2 to candidate set. If k is not satisfied, our algorithm expands a border point between q 2 and b 4 because b 4 has the shortest distance to q 2 among border points, as shown in Fig. 3.…”
Section: Definition 8 Adjacent End Border Point (Adjb)mentioning
confidence: 99%
“…Thus, P 3 is added to the candidate set. Nevertheless, if k is still not satisfied, the algorithm should expand the border point of b 4 , thus reaching border points b 6 and b 7 . Moreover, q 1 and q 2 can share the distance between b 4 and b 6 and the distance between b 4 and b 7 as shown in Fig.…”
Section: Definition 8 Adjacent End Border Point (Adjb)mentioning
confidence: 99%
See 1 more Smart Citation