2017 International Conference on Computing, Networking and Communications (ICNC) 2017
DOI: 10.1109/iccnc.2017.7876153
|View full text |Cite
|
Sign up to set email alerts
|

PPVC: Privacy Preserving Voronoi Cell for location-based services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
7
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…Location perturbation and obfuscation technique [11−14] adds some noise to the real location, then expands the query region to ensure the quality of service. Spatial and temporal cloaking technique [9,10] generates a suitable cloaking area including at least k − 1 users. Dummy location technique [3,15,16] generates dummies and submits them with the real one to the LBS server.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Location perturbation and obfuscation technique [11−14] adds some noise to the real location, then expands the query region to ensure the quality of service. Spatial and temporal cloaking technique [9,10] generates a suitable cloaking area including at least k − 1 users. Dummy location technique [3,15,16] generates dummies and submits them with the real one to the LBS server.…”
Section: Related Workmentioning
confidence: 99%
“…To address these privacy issues, many approaches [1−6] have been proposed to protect location privacy in literature. Besides policy-based solutions and cryptography primitive-based approaches [7,8] , there are several nonencryption techniques, such as spatial cloaking [9,10] , location perturbation and obfuscation [11−14] , and dummy location [3,15,16] . These methods are widely used because their computation overhead is much smaller than cryptography primitive-based approaches.…”
Section: Introductionmentioning
confidence: 99%
“… Many of the existing obfuscation techniques generate CRs at random, without considering any prior related to the user 7,9 . Thus, from a given random CR 0 , an adversary with information 1 can exclude some locations (the dark regions in Figure 1a) for having very low probability to be the user's location and finds a smaller region, CR0. The majority of the methods focus on a single query and fail to provide privacy for multiple queries.…”
Section: Introductionmentioning
confidence: 99%
“…Another category of user-centric approaches is the disclosure of locations with reduced precision, called location obfuscation. [7][8][9][10] The idea is to replace a user's precise location information with a larger region called the concealing region (CR), with a compromise of quality-of-service (QoS). Unlike many other approaches, through methodical design, obfuscation approaches can be implemented in various applications, including real-time navigation, POI search, and social network check-ins.…”
mentioning
confidence: 99%
“…On the other hand, location trajectories can excavate more sensitive information despite location. In this regard, location privacy-preserving mechanisms have been extensively studied, such as Dummy, spatial confusion [3,4], encryption technology [5,6], differential privacy (DP) [7,8] and references therein.…”
mentioning
confidence: 99%