2020
DOI: 10.1109/access.2020.3018417
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Privacy-Preserving Multi-Keyword Query Scheme in Location Based Services

Abstract: With the proliferation of location-aware mobile devices and the prevalence of wireless communications, location-based services (LBS) have attracted much particular attention in recent years. For flexibility and cost savings, the LBS provider outsources the LBS data to the cloud in order to serve the increasing number of mobile users. To guarantee users' privacy and data confidentiality, some excellent works have been proposed which focus on secure query over the location server. However, these existing works h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…The experiment compares the proposed algorithm (QLPSO), the traditional generalized user selection algorithm (baseline), and the optimal inhibition rate (OPT). We also select two methods to make a comparison containing MKQ (Zhang et al, 2020) and DAAL (Zeng et al, 2021). Figure 3 describes the influence of the user number on the inhibition rate.…”
Section: The E Ect Of User Number On Inhibition Ratementioning
confidence: 99%
“…The experiment compares the proposed algorithm (QLPSO), the traditional generalized user selection algorithm (baseline), and the optimal inhibition rate (OPT). We also select two methods to make a comparison containing MKQ (Zhang et al, 2020) and DAAL (Zeng et al, 2021). Figure 3 describes the influence of the user number on the inhibition rate.…”
Section: The E Ect Of User Number On Inhibition Ratementioning
confidence: 99%
“…It can be seen that, except [23], the other three schemes are resistant to server attacks because they store the location points in ciphertext on the server. The scheme proposed by Zhang et al [10] supports multi-user environment while no update of location points. The update of location points in [22] holds with a heavy overhead.…”
Section: Theoretical Analysismentioning
confidence: 99%
“…Many privacy protection techniques have been proposed according to different application scenarios and protection means. They can be broadly classified according to the privacy protection techniques used: spatial obfuscation techniques [5][6][7], data transformation techniques [8], false location perturbation techniques [9], and encryption techniques [10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…LBS privacy protection 12,13 is commonly implemented according to three system architectures: centralized, distributed, and hybrid. The centralized architecture is comprised of mobile terminals, a trusted anonymous server, and an LBS server.…”
Section: Lbs Privacy Protection Architecturesmentioning
confidence: 99%