2017
DOI: 10.1177/1550147717739156
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving method based on Voronoi diagram in mobile crowd computing

Abstract: With the development of mobile smartphones equipped with a large number of sensor devices, mobile crowd computing has become the hotspot of current research. In the application, the publishers use the application platform to release the task and then select the appropriate users to participate in the task by bidding and collect their data, in which the users' identity, location, and other private information face the risk of disclosure. To solve the problem of privacy disclosure in mobile crowd computing, we p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Based upon statistics with mean vector and covariance matrix, a Voronoi diagram was proposed in [31]. A Voronoi diagram was constructed in [32] to form a cloaked region and calculate the anchor point of the cloaked region for privacy preservation. A window-vertex-sorted triangle propagation algorithm was proposed in [33] to construct geodesic based Voronoi diagrams.…”
Section: Related Workmentioning
confidence: 99%
“…Based upon statistics with mean vector and covariance matrix, a Voronoi diagram was proposed in [31]. A Voronoi diagram was constructed in [32] to form a cloaked region and calculate the anchor point of the cloaked region for privacy preservation. A window-vertex-sorted triangle propagation algorithm was proposed in [33] to construct geodesic based Voronoi diagrams.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [14] proposed a privacy-aware framework, where the participants submitted their data to the server by adjusting the sensing range. Long et al [15] proposed a privacy preserving method based on Voronoi Polygon which formed a cloaked region to hide users identity by constructing the Voronoi diagram. However, the cloaking location of the uploaded data may lead to inaccurate checking results.…”
Section: Related Workmentioning
confidence: 99%
“…where λ 1 = λ 2 = 0. Proof: In order to prove the correctness of the proposition, we derive (14) and (15) in regard to P and r from (7) and (9) as follows:…”
Section: F the Quality-privacy Tradeoff Of The Server-aided Rot Protmentioning
confidence: 99%
See 1 more Smart Citation