2017 IEEE Symposium on Privacy-Aware Computing (PAC) 2017
DOI: 10.1109/pac.2017.33
|View full text |Cite
|
Sign up to set email alerts
|

Poster: Smart-Contract Based Incentive Mechanism for K-Anonymity Privacy Protection in LBSs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…To avoid the usage of TTS secure systems, BC SC technology is beneficial. Geng et al [34] introduced an enhanced k-anonymity approach to use for privacy protection with SC. It is a BC-based secure incentive mechanism that motivates users to prefer a k-anonymity algorithm for privacy preservation.…”
Section: A Privacy-preserving Artificial Intelligence Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…To avoid the usage of TTS secure systems, BC SC technology is beneficial. Geng et al [34] introduced an enhanced k-anonymity approach to use for privacy protection with SC. It is a BC-based secure incentive mechanism that motivates users to prefer a k-anonymity algorithm for privacy preservation.…”
Section: A Privacy-preserving Artificial Intelligence Techniquesmentioning
confidence: 99%
“…Data stored in SCs can be visible to anyone as it is in plain text; an attacker can read the contract and track the information of the requester. This issue is addressed by Geng et al [34], they have used public and private contract approach where private contracts can only be accessed by users who are participants of the k-anonymous group. Group encryption is used to keep the public contract secret, and to verify the contract, blind collective DS (digital signature) is used.…”
Section: A Privacy-preserving Artificial Intelligence Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…A contractual agreement between all the participants is set up not to leak this information to the external parties. Anonymity is an effective way to protect participants' personal data [27] and the DSO system will also protect the data against cyber-attacks.…”
Section: Blockchain For P2p Energy Exchangementioning
confidence: 99%