2021
DOI: 10.1109/tits.2020.2992232
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Privacy of Location-Based Services in Road Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 50 publications
0
8
0
Order By: Relevance
“…Method Application [23], [29] Privacy Labels Data privacy [1], [33] Blockchain methods GDPR compliance [83], [84] Virtual Trip Lines Anonymous data collection [96] Private Info. Retrieval Anonymous data retrieval [97]- [99] Differential Privacy Anonymous data retrieval…”
Section: Papermentioning
confidence: 99%
See 1 more Smart Citation
“…Method Application [23], [29] Privacy Labels Data privacy [1], [33] Blockchain methods GDPR compliance [83], [84] Virtual Trip Lines Anonymous data collection [96] Private Info. Retrieval Anonymous data retrieval [97]- [99] Differential Privacy Anonymous data retrieval…”
Section: Papermentioning
confidence: 99%
“…Privacy-by-design can be further employed per individual service, as in [84] who employed VTLs to collect anonymous traffic data. Similarly, [96] attempt to protect privacy in location-based services i.e. services which answer users' queries to points of interest using Private Information Retrieval.…”
Section: Papermentioning
confidence: 99%
“…We adopt the following notation in this section: p 2 = q > 2, and p are prime numbers, and m = 2q (later we split this case into subcases p = 2 and p > 2). Our starting point is the block matrix A = A 2 ; A 1 ; A 3 over Z p , where A 1 and A 2 are described in (9), and A 3 in ( 23) and (24).…”
Section: Elimination Steps In Type-3 Matrixmentioning
confidence: 99%
“…A main challenge in constructing PIR protocols is minimizing the communication complexity. The idea of PIR was introduced by Chor et al [1], together with the 2-server PIR protocol having the communication complexity O(n 1/3 ) for the dataset size n. PIR has a wide variety of applications such as anonymous communication [2,3], privacy-preserving media streaming [4], blockchain security [5,6], personalized advertisement [7], location and contact discovery [8][9][10], etc.…”
Section: Introduction 1private Information Retrievalmentioning
confidence: 99%
“…In order to protect the location privacy of users in LBS, various location privacy preservation technologies have been proposed. These technologies can be classified into three categories, i.e., Private Information Retrieval (PIR) [2], location generalization [3], and location perturbation [4]. PIR is based on cryptography and can provide provable privacy preservation.…”
Section: Introductionmentioning
confidence: 99%