2019
DOI: 10.1016/j.jisa.2018.12.001
|View full text |Cite
|
Sign up to set email alerts
|

Modeling location obfuscation for continuous query

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…In ambiguity mechanisms, the spatial resolution of the user is decreased to pre-serve the exact level of their presence. In some cases, a set of fake locations is produced for the user to protect their privacy [14]. Points Of Interest (PoI) and adding random data are two examples of ambiguity methods [15].…”
Section: Privacy-preserving Methodsmentioning
confidence: 99%
“…In ambiguity mechanisms, the spatial resolution of the user is decreased to pre-serve the exact level of their presence. In some cases, a set of fake locations is produced for the user to protect their privacy [14]. Points Of Interest (PoI) and adding random data are two examples of ambiguity methods [15].…”
Section: Privacy-preserving Methodsmentioning
confidence: 99%
“…A theoretical model for location obfuscation is presented in [16]; this model allows the specification of different obfuscation levels. To clarify the proposed model's effectiveness, the authors analyze a popular square grid-based obfuscation mechanism, focusing mainly on obfuscation-based privacypreserving mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…A cloaking region consists of several locations in which the user could be, ensuring that they are present in one of them. Approaches such as in [8][9][10][11][12][13][14][15][16][17][18] give support to the cloaking region. Overall, these approaches deal with a trusted third party, named the anonymizer, which is responsible for choosing other locations according to the type of protection that the user is requesting.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…ese location obfuscation techniques are achieved by deliberately reducing the resolution of the user's location to protect user privacy, namely, using a cloaking region instead of the user's actual location. To release ambiguous location is often used as a simple and effective technique [9][10][11]. Space Twist framework avoids the high computational cost and communication cost caused by the ASR.…”
Section: Related Workmentioning
confidence: 99%