2020
DOI: 10.1109/access.2020.2985659
|View full text |Cite
|
Sign up to set email alerts
|

HBLP: A Privacy Protection Framework for TIP Attributes in NTTP-Based LBS Systems

Abstract: Nowadays, location-based services are being widely popularized due to their massive usage in current and emerging technologies. These services are based on searching out areas of interest which are likely to be accessed by users. Despite helping users worldwide, Location Based Services (LBSs) Systems endanger users' privacy because a user must provide personal information in order to use the services. Users thus become easy prey for assailants to access their social and personal lives. This problem is a giant … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…However, location cloaking is accessible to query tracking attacks, where the opponent can determine the querier by comparing the two sectors in the LBS queries. Similarly, Alsubhi et al [39] proposed HBLP privacy protection scheme using PID and PLAM protocols in a peer to peer (P2) model. HBLP improved overall privacy while a user interacts with LBS system but all the query content was depended on forest user.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, location cloaking is accessible to query tracking attacks, where the opponent can determine the querier by comparing the two sectors in the LBS queries. Similarly, Alsubhi et al [39] proposed HBLP privacy protection scheme using PID and PLAM protocols in a peer to peer (P2) model. HBLP improved overall privacy while a user interacts with LBS system but all the query content was depended on forest user.…”
Section: Related Workmentioning
confidence: 99%
“…To determine the privacy level, we have evaluated the anonymous entropy and compared the proposed PDAS with three existing different dummy position-based approaches, including E-DLS algorithm [37], random dummy positionbased algorithm, Dest-ex method [38], and HBLP [39]. In Figure . 13, we noticed that ADPA attained the maximum entropy level and reached up to 3.68 when the number of dummy positions (K) is 10.…”
Section: Anonymous Entropymentioning
confidence: 99%
“…[1]. [3,46] discussed that the specifications and concerns of current security and privacy protection approaches have been discussed to resolve the problem of big data security and privacy protection and expose the idea of large data cloud computing and its linkages. On a cloud platform, a reference model is suggested.…”
Section: Literature Reviewmentioning
confidence: 99%
“…IoT and Edge computing, to develop a hybrid mechanism that will detect and track the suspected CoVID'19 victims. While working on proposed model in future, security and privacy will also be the major concerns that can be addressed by using advance techniques [31][32] [33].…”
Section: Future Perspective Planmentioning
confidence: 99%