2018 IEEE Global Communications Conference (GLOBECOM) 2018
DOI: 10.1109/glocom.2018.8647719
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…5. Comparison of effects after using our method resents the dummy selection method [4], and LODS [8]. Additionally, these two methods cannot be applied to our data directly, thereby, we keep the core ideas of these methods while some changes were made to accommodate our data.…”
Section: Quantifiable Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…5. Comparison of effects after using our method resents the dummy selection method [4], and LODS [8]. Additionally, these two methods cannot be applied to our data directly, thereby, we keep the core ideas of these methods while some changes were made to accommodate our data.…”
Section: Quantifiable Resultsmentioning
confidence: 99%
“…Unfortunately, the existing dummy-based schemes mainly focus on protecting the user's location privacy in a single query or a whole journey within twenty-four hours. Some researchers have already considered long-term location privacy protection [8], [12], but these methods may still have some shortcomings that a region is the user's high frequency active area, not just a location. When the user adopts these schemes to protect his location privacy in consecutive requests, and we utilize the hypothetical adversary method in Sec IV to attack, some dummies can be inferred with no less than 25% correct ratio.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…While strengthening the location privacy, this solution still operates at higher layers, leaving open the possibility of localizing and identifying users by physical layer techniques, as detailed in the following. Other approaches resort to k-anonymity [ 6 ] or differential privacy [ 7 ]. In [ 8 ], the direct connection between the location service provider and the user is cut by resorting to a multi-server architecture and a differential privacy approach.…”
Section: Literature Backgroundmentioning
confidence: 99%
“…In the direction of spatial obfuscation, Gruteser et al [ 23 ] first used the k -anonymity mechanism to obfuscate the user’s location in the anonymizing servers. These methods of generalizing the user’s location into a larger area or adding more other locations [ 24 ] will reduce the accuracy of the location query, resulting in a reduction in the quality of location services. Similar to spatial obfuscation, location perturbations will also reduce the quality of location services.…”
Section: Related Workmentioning
confidence: 99%