2018 IEEE Symposium on Privacy-Aware Computing (PAC) 2018
DOI: 10.1109/pac.2018.00022
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…The researchers in [ 19 ] used a cryptographic technique to present a reliable and effective scheme for preserving location privacy. Because the identity of the user is hidden from the location-based service (LBS) provider and fog server, it can protect the user’s private information.…”
Section: Related Workmentioning
confidence: 99%
“…The researchers in [ 19 ] used a cryptographic technique to present a reliable and effective scheme for preserving location privacy. Because the identity of the user is hidden from the location-based service (LBS) provider and fog server, it can protect the user’s private information.…”
Section: Related Workmentioning
confidence: 99%
“…A privacy-preserving method that can be applied both at server and user sides is the encryption of location data, via various encryption mechanisms [36][37][38]. Even if encryption/decryption costs are quite affordable by nowadays mobile devices and smartphones, the encryption/decryption studies for location privacy available in the current literature point out that a main drawback of this approach is the relatively high delay [37] introduced in the data encryption/decryption processes, delay which may be not tolerable for many proximity-based services.…”
Section: Classification Of Location-privacy Mechanismsmentioning
confidence: 99%
“…[ [36][37][38] Server-side k-anonymity/ Spatial cloaking Minimizes risks of re-identification of anonymized data; however, this approach is susceptible to privacy breaches, such as de-anonymization, in cases where the adversary has prior knowledge about individuals. To tackle the issue, such approaches as t-closeness and l-diversity were developed to augment the k-anonymity privacy protection [43,44].…”
Section: Communication Encryptionmentioning
confidence: 99%
“…For several objectives, such as discovering the closest required positions, relatives/friends, and wearable devices for positioning and administrating aims, Location‐based service (LBS) are getting vast attention [34]. However, several privacy concerns will be raised by location‐based services.…”
Section: Privacy In Mobile Generationsmentioning
confidence: 99%