2021
DOI: 10.1109/jsen.2021.3070645
|View full text |Cite
|
Sign up to set email alerts
|

A Personalized Secure Publishing Mechanism of the Sensing Location Data in Crowdsensing Location-Based Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 19 publications
0
1
0
Order By: Relevance
“…The scheme [29] specifies that the personal privacy requirements of a location are negatively correlated with the number of hops to the sensitive location. The algorithm in [30] coordinates semantic privacy and location privacy based on the driver's requirements, which are measured in terms of the relationship between the drivers. Then, a game-theoretic model is constructed to protect location and differential privacy based on social distance.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The scheme [29] specifies that the personal privacy requirements of a location are negatively correlated with the number of hops to the sensitive location. The algorithm in [30] coordinates semantic privacy and location privacy based on the driver's requirements, which are measured in terms of the relationship between the drivers. Then, a game-theoretic model is constructed to protect location and differential privacy based on social distance.…”
Section: Related Workmentioning
confidence: 99%
“…According to multiattribute decision theory [30,31], the attribute whose value is positively proportional to the likelihood of a solution being chosen is called the benefit attribute; conversely, the attribute whose value is inversely proportional to the likelihood of a solution being chosen is called the cost attribute. Among the above two attributes, the Euclidean distance D between all service request locations and their nearest sensitive locations on the driving route recommended by the user in the k entry belongs to the benefit attribute.…”
Section: Multiattribute Decision Model Based On Information Entropymentioning
confidence: 99%
“…It effectively solves the huge pressure problem brought by massive data transmission and storage to network and cloud storage center by sinking data storage and computing to network edge [13,14]. However, as a distributed data processing method, MEC nodes may involve the mutual exchange of sensitive data in the process of cooperative data processing, which may lead to data privacy leakage [15].…”
Section: Introductionmentioning
confidence: 99%