2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00280
|View full text |Cite
|
Sign up to set email alerts
|

Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…Trajectory privacy protection methods considering correlations within a single trajectory. e spatiotemporal correlation contained in the trajectory data easily leads to the privacy leakage problem of the users [31]. Many researchers have proposed trajectory privacy-preserving methods considering the temporal and spatial correlation within a trajectory.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Trajectory privacy protection methods considering correlations within a single trajectory. e spatiotemporal correlation contained in the trajectory data easily leads to the privacy leakage problem of the users [31]. Many researchers have proposed trajectory privacy-preserving methods considering the temporal and spatial correlation within a trajectory.…”
Section: Related Workmentioning
confidence: 99%
“…Literature Limitations Methods without considering the correlation Suppression [4] and bounded perturbation [22] Kanonymity and its derivation [3,23,24]differential privacy [25][26][27][28][29][30] Face combination attacks and background knowledge attacks, and do not consider the privacy leakage caused by trajectory correlations Methods considering correlations within a single trajectory [6][7][8]31] Do not consider the privacy leakage caused by trajectory correlations…”
Section: Categorymentioning
confidence: 99%
“…In location-based social networks, user interaction is mainly through check-in and photo sharing. The study [62] proposed an inference model based on the spatial distribution of historical check-in and photos. By analyzing multiple events, including check-in and photos, the user's location can be inferred with high accuracy.…”
Section: Social Behavior-based Approachesmentioning
confidence: 99%
“…A major improvement of vanilla k-anonymity is the dummy approach in which k − 1 number of dummy locations are directed with the real one to a service provider without relying on a TTP. 4,[18][19][20][21][22][23][24][25][26] However, the majority of the existing methods generate the dummies at random. 4 19 DLS, enhanced-DLS 20 methods improve this limitation by considering probability of submitting queries from locations.…”
Section: Related Workmentioning
confidence: 99%
“…However, reliance on a TTP to get a real user's information is a serious limitation of these approaches. A major improvement of vanilla k ‐anonymity is the dummy approach in which k − 1 number of dummy locations are directed with the real one to a service provider without relying on a TTP 4,18‐26 . However, the majority of the existing methods generate the dummies at random 4 .…”
Section: Related Workmentioning
confidence: 99%