2016
DOI: 10.1007/s00500-016-2040-2
|View full text |Cite
|
Sign up to set email alerts
|

An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(30 citation statements)
references
References 19 publications
0
30
0
Order By: Relevance
“…In [16], the authors present an incentive-based batch algorithm to build a K-anonymity covering with K − 1 willing participants. In this work, a probability threshold is suggested to indicate a user's reputation on a framework based on fuzzy logic.…”
Section: Mobile Information Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [16], the authors present an incentive-based batch algorithm to build a K-anonymity covering with K − 1 willing participants. In this work, a probability threshold is suggested to indicate a user's reputation on a framework based on fuzzy logic.…”
Section: Mobile Information Systemsmentioning
confidence: 99%
“…Most of the approaches [2][3][4][5][6][7][8][9][10][11] are based on a trusted third party, called the anonymizer, which is responsible for selecting these additional locations depending on what type of protection a user is demanding. Other techniques such as [12][13][14][15][16] assume that the same users, collaborating with other peers, can compute their own cloaking regions. In addition, a few articles have proposed a hybrid approach, in which an anonymizer and users collaborate to create cloaking regions [17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…In the location privacy protection approach put forward by Sun G et al [18], location labels are adopted to distinguish mobile users' sensitive locations and ordinary locations, both of which are protected at different levels, thus the response efficiency of LBS requests is improved. According to Li et al [19], to improve the efficiency of selecting dummy locations, an credit-incentive mechanism is introduced in K -anonymity scheme. Based on fuzzy logic, each user's credit level corresponds to certain probability threshold value.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, many techniques have been proposed to solve the problem of location privacy protection, such as location perturbation and obfuscation [18,19], region anonymization [20][21][22], and dummy location [23]. The region anonymization technique, which reduces the probability of identifying the real user to 1/k, is an important one for location privacy protection.…”
Section: Introductionmentioning
confidence: 99%