2021
DOI: 10.1007/s11042-021-10789-0
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…In order to test the performance of the location privacy protection method proposed in this paper, the algorithm has been fully experimented in terms of data availability, privacy protection degree, and algorithm running time. The experiment is implemented using Python, and the data sets are Gowalla data set and Geolife data set [18,19]. The experimental environment of this article is PyCharm.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…In order to test the performance of the location privacy protection method proposed in this paper, the algorithm has been fully experimented in terms of data availability, privacy protection degree, and algorithm running time. The experiment is implemented using Python, and the data sets are Gowalla data set and Geolife data set [18,19]. The experimental environment of this article is PyCharm.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…Arain et al 31 proposes an algorithm to protect the information of mobile vehicle’s users and use geo-indistinguishability to obtain a set of POIs near the source location and destination location. Luo et al 32 first classified the location set through a density-based clustering algorithm and then perturbed the real locations according to geo-indistinguishability so as to solve the problem of privacy leakage caused by frequent check-in. Xiong et al 33 applied geo-indistinguishability to spatial crowdsourcing and combined location obfuscation and path optimization to provided strong privacy protection with minimal cost.…”
Section: Related Workmentioning
confidence: 99%
“…In order to solve the location privacy leakage problem in LBS, various methods for environments both in free space and road network have been proposed, such as K-anonymity [12][13][14][15][16][17][18] , local differential privacy [19][20][21][22][23][24][25][26][27] , geo-indistinguishability 10,11,[28][29][30][31][32][33][34][35][36] , and location semantics [37][38][39][40][41][42][43][44][45] . Marco Gruteser et al introduced the concept of K-anonymity in relational databases into the field of privacy protection of location-based services and proposed the location K-anonymity model 12 .…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In our experiments, DPLPA and L-cluster algorithms are implemented in Python and runs on Windows10 platform with 3.6GHz CPU and 8.00 random access memory (RAM). The datasets used in experiment are real datasets of Geolife [29] and Gowalla [30]. Then we compared DPLPA with P-STM algorithm and LPPA-PSRDU algorithm.…”
Section: Experimental Settingmentioning
confidence: 99%