2018
DOI: 10.3390/ijgi7020053
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Privacy Architecture to Preserve User Trajectories in Reward-Based LBS Applications

Abstract: How can training performance data (e.g., running or walking routes) be collected, measured, and published in a mobile program while preserving user privacy? This question is becoming important in the context of the growing use of reward-based location-based service (LBS) applications, which aim to promote employee training activities and to share such data with insurance companies in order to reduce the healthcare insurance costs of an organization. One of the main concerns of such applications is the privacy … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 37 publications
0
12
0
Order By: Relevance
“…None of the existing privacy approaches for LBS systems can anonymize the mobile user trajectories while keeping a small energy footprint to the best of our knowledge. For instance, Hasan et al 6 proposed a privacy architecture to preserve user trajectories in reward‐based LBS applications that can anonymize the user trajectories with a fixed global location. However, the proposed approach suffers from a significant processing overhead when it is used in real‐world applications.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…None of the existing privacy approaches for LBS systems can anonymize the mobile user trajectories while keeping a small energy footprint to the best of our knowledge. For instance, Hasan et al 6 proposed a privacy architecture to preserve user trajectories in reward‐based LBS applications that can anonymize the user trajectories with a fixed global location. However, the proposed approach suffers from a significant processing overhead when it is used in real‐world applications.…”
Section: Related Workmentioning
confidence: 99%
“…One of the major concerns of any LBS‐based system is the privacy of mobile user trajectories. Most of the existing LBS approaches 5,6 collect user locations over time with user identities periodically. This could lead to different kinds of personal privacy breaches if a leak of the identified trajectories occurs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…So, this paper was developed using the concept of technology acceptance behavior, which was then applied to LBS users to specify LBS usage intention, as well as technology acceptance behavior opinions. Hasan et al [49] preset the problem of personal privacy in LBS, proposed a privacy architecture, and focused the bounded perturbation technique on keeping the trajectory of each user from the privacy gaps.…”
Section: Related Workmentioning
confidence: 99%
“…A plethora of studies have been conducted for handling mobile objects' trajectory data. More precisely, several of them attempt to reduce the storage size [3][4][5], while others investigate the privacy preservation of trajectory data [6,7]. Nowadays, not only are storage-efficient spatio-temporal transformation schemes needed, but also secure querying on large-scale spatio-temporal data [8].…”
mentioning
confidence: 99%