2022
DOI: 10.1155/2022/3984099
|View full text |Cite
|
Sign up to set email alerts
|

LPPS-AGC: Location Privacy Protection Strategy Based on Alt-Geohash Coding in Location-Based Services

Abstract: The Internet of Things (IoT) connects billions of physical devices around the world to the Internet to collect and share massive data. Location privacy leakage has received considerable attention in the field of security. In order to implement the k -anonymity location privacy protection mechanism, a previous work constructed an anonymous location set by retrieving historical request record database from the trusted third an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 38 publications
0
0
0
Order By: Relevance
“…Xing et al [47] designed the G-Casper scheme, which uses the user's Geohashencoded location grid and its surrounding eight grids as candidate grids, and selected one or more grids to construct the hidden intervals through the processing the random grid numbering, checking the number of users, and pruning. Zhang et al [48] incorporated the height coordinates of user locations and designed a k-anonymous location privacy protection strategy based on the Alt-Geohash encode. All these schemes assume that the AS is absolutely secure and trustworthy, but in reality, no such AS exists, because the AS is at the central key position of the architecture and thus it is more vulnerable to attack and to becoming a performance bottleneck for the system.…”
Section: Research On Geohash In Location Services and Privacy Protectionmentioning
confidence: 99%
“…Xing et al [47] designed the G-Casper scheme, which uses the user's Geohashencoded location grid and its surrounding eight grids as candidate grids, and selected one or more grids to construct the hidden intervals through the processing the random grid numbering, checking the number of users, and pruning. Zhang et al [48] incorporated the height coordinates of user locations and designed a k-anonymous location privacy protection strategy based on the Alt-Geohash encode. All these schemes assume that the AS is absolutely secure and trustworthy, but in reality, no such AS exists, because the AS is at the central key position of the architecture and thus it is more vulnerable to attack and to becoming a performance bottleneck for the system.…”
Section: Research On Geohash In Location Services and Privacy Protectionmentioning
confidence: 99%