2023
DOI: 10.1109/tkde.2023.3295451
|View full text |Cite
|
Sign up to set email alerts
|

PEAK: Privacy-Enhanced Incentive Mechanism for Distributed K-Anonymity in LBS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…This formulation encapsulates the interplay between user beliefs, protection mechanisms, and the spatial, semantic, and temporal context in determining the quality loss. Formula (6) shows that the more consistent the semantics between the true location of the user and the generated perturbation location are, the more consistent the temporal properties are and the less quality loss is.…”
Section: Evaluation Indexmentioning
confidence: 99%
See 1 more Smart Citation
“…This formulation encapsulates the interplay between user beliefs, protection mechanisms, and the spatial, semantic, and temporal context in determining the quality loss. Formula (6) shows that the more consistent the semantics between the true location of the user and the generated perturbation location are, the more consistent the temporal properties are and the less quality loss is.…”
Section: Evaluation Indexmentioning
confidence: 99%
“…Researchers have approached the challenge of location-based privacy protection from various perspectives. Pseudonym techniques [ 2 ], dummy location methods [ 3 ], encryption techniques [ 4 ], and anonymity techniques [ 5 , 6 ] have been employed to safeguard user privacy. Pseudonymous queries [ 7 ] have also been utilized to protect query privacy.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, the model pays full attention to users’ characteristics and requirements, exhibits strong scalability, and proves to be well suited to practical application scenarios. To further enhance the privacy protection effect of trajectories, this research [ 45 ] proposes the Privacy-Enhanced Distributed k -Anonymous Reward Mechanism (PEAK) to incentivize users to participate in distributed k -anonymity privacy protection in location services. PEAK does not need to trust third parties, establishes anonymous zones through currency transactions and location transmission, introduces role recognition and accountability mechanisms to limit malicious users, improves security and feasibility, and successfully establishes anonymous zones with a success rate of over 0.9, significantly reducing the utility of malicious users.…”
Section: Related Workmentioning
confidence: 99%
“…LBS refers to obtaining the specific geographical location coordinates of users in the mobile Internet through positioning technology, and the location service provider (LSP) provides the user with corresponding information query, entertainment games and other related mobile Internet services [1]. In real-life scenarios, LBS is commonly used in applications such as maps and navigation, local searches, and location-based advertising.…”
Section: Introductionmentioning
confidence: 99%