2017
DOI: 10.1155/2017/6814832
|View full text |Cite
|
Sign up to set email alerts
|

Prophet: A Context-Aware Location Privacy-Preserving Scheme in Location Sharing Service

Abstract: Location sharing service has become an indispensable part in mobile social networks. However, location sharing may introduce a new class of privacy threats ranging from localizing an individual to profiling and identifying him based on the places he shared. Although users may avoid releasing geocontent in sensitive locations, it does not necessarily prevent the adversary from inferring users' privacy through space-temporal correlations and historical information. In this paper, we design a Prophet framework, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…To obtain the other party's position, currently, there are mainly two solutions: (1) Waiting for response: With the help of indoor positioning techniques [2] and location sharing services [3], one could share its location to the other and wait for the response. However, that relies heavily on the responder being able to respond to this kind of location sharing.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…To obtain the other party's position, currently, there are mainly two solutions: (1) Waiting for response: With the help of indoor positioning techniques [2] and location sharing services [3], one could share its location to the other and wait for the response. However, that relies heavily on the responder being able to respond to this kind of location sharing.…”
Section: Related Workmentioning
confidence: 99%
“…Providing services by positioning and location sharing, the LBS server returns the LBS requestor the point of interest (POI) according to the request containing the requestor's location and services of interest. Over the years, researchers have proposed various indoor navigation methods to find a certain POI [2][3][4][5]. While, we propose the location paging and answering service (LPAS) for finding out someone in an indoor environment, especially when he is out of contact.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A Content Concealed Bottle mechanism has also been proposed to maintain privacy in LBS systems [29], and this has three main categories, i.e., (1) a secure matching stage, (2) a Euclidean distance computation, and (3) a private point of interest (POI) retrieval stage. The user generates a vector attribute query which is compared with existing saved vectors in the database server, and the protocol of the Euclidean distance computation finds the difference between the two parameters.…”
Section: B Related Workmentioning
confidence: 99%
“…We shall call this method as the Double Cache Approach (DCA) and demonstrate the capabilities of that DCA to protect the patient location from malicious SP without effecting the quality of services. It should be noted the other known methods as those discussed in [43][44][45][46] cannot protect the privacy of A from B or SP. In reality, DCA can be seen as an enhancement of the P2PCache and removes the following anomalies of [23]:…”
Section: Double Cache Approach (Dca)mentioning
confidence: 99%