2016
DOI: 10.3390/s16121993
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data

Abstract: With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 42 publications
0
6
0
Order By: Relevance
“…All forms of data obscuring (except encryption) involve some degree of data quality degradation. Options for obscuring location data include: removal, 4 encryption, 12 cloaking, 11 adding noise, 10,13 decreasing the resolution, 14 and simulation. [15][16][17][18] Of note, modern methods for simulating synthetic data can provide nuanced data that can be minimally "lossy" while preserving privacy.…”
Section: Mitigation Strategies -Technicalmentioning
confidence: 99%
“…All forms of data obscuring (except encryption) involve some degree of data quality degradation. Options for obscuring location data include: removal, 4 encryption, 12 cloaking, 11 adding noise, 10,13 decreasing the resolution, 14 and simulation. [15][16][17][18] Of note, modern methods for simulating synthetic data can provide nuanced data that can be minimally "lossy" while preserving privacy.…”
Section: Mitigation Strategies -Technicalmentioning
confidence: 99%
“…He et al provided a publish‐subscribe system with secure proxy decryption in mobile social networks, which is based on cipher‐policy A B E and public‐key encryption with keyword search. Xie et al propose a privacy‐preserving LBS scheme based on the RSA algorithm and ciphertext policy attribute‐based encryption scheme, involving a Trusted Authority.…”
Section: Related Workmentioning
confidence: 99%
“…Protection of data is a critical issue and has been an active area of research (Yao et al, 2013;Chow et al, 2009). Numerous approaches have been proposed and implemented including various routing and encryption techniques (Karimi & Kalantari, 2018;Xie & Wang, 2016) in order to prevent the data leakage to the adversaries. Adversaries are the ones who attack the network when the data is being transmitted.…”
Section: Introductionmentioning
confidence: 99%