2018
DOI: 10.1109/tii.2017.2773646
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
106
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 268 publications
(119 citation statements)
references
References 17 publications
0
106
0
1
Order By: Relevance
“…Wu et al [20] introduced a continuous location entropy and trajectory entropy based on the gravity mobility model in the Internet of Things. Yin et al [21] proposed a location privacy protection scheme that satisfies the differential privacy constraint to protect the user's location information privacy, maximizing data availability in the industrial Internet of Things. Wu et al [22] introduced a privacy protection scheme to solve the privacy protection problem in the Internet of Things, named EUROCRYPT15.…”
Section: Privacy Protection and Security In The Internet Of Thingsmentioning
confidence: 99%
See 1 more Smart Citation
“…Wu et al [20] introduced a continuous location entropy and trajectory entropy based on the gravity mobility model in the Internet of Things. Yin et al [21] proposed a location privacy protection scheme that satisfies the differential privacy constraint to protect the user's location information privacy, maximizing data availability in the industrial Internet of Things. Wu et al [22] introduced a privacy protection scheme to solve the privacy protection problem in the Internet of Things, named EUROCRYPT15.…”
Section: Privacy Protection and Security In The Internet Of Thingsmentioning
confidence: 99%
“…The reason is that the Enhanced-DLP scheme can guarantee that the chosen dummy locations comprise an anonymous set with the largest entropy and enough dummy locations whose query probability are the same as the user's real location, thus the LBS server still cannot identify the user's real location from k locations. From Step (21) to Step (29), as the chosen k dummy locations have a similar historical query probability and the Enhanced-DLP ensures the uncertainty of the selection, the LBS server cannot identify the user's real location from k locations.…”
mentioning
confidence: 99%
“…It is mainly aimed at the query and release of location information. Related location privacy protection technologies include location anonymous technologies, among which application research of kanonymous technology proposed by Samarati and Sweeney is the most widely used [7]: encryption technologies, such as secure multiparty computing technology, homomorphic encryption technology, fake convergence node protocol, and RFID privacy protection technology [8]. IoT location privacy protection technology has gradually matured, but protection technology related to mobile location privacy is still in its infancy.…”
Section: Research Statusmentioning
confidence: 99%
“…In recent years, various technologies have been broadly used for data privacy protection, such as private information retrieval [6][7][8][9][10][11], searchable encryption [12][13][14][15][16][17], and secure multi-party computation [18][19][20][21][22][23], but these technologies can only provide limited functions, such as keyword search, order search, range query, and subset search. However, for many application scenarios in the cloud environment, it requires various types operations of ciphertext data.…”
Section: Introductionmentioning
confidence: 99%