2013
DOI: 10.1007/s10707-013-0192-0
|View full text |Cite
|
Sign up to set email alerts
|

Protecting query privacy in location-based services

Abstract: The popularity of location-based services (LBSs) leads to severe concerns on users' privacy. With the fast growth of Internet applications such as online social networks, more user information becomes available to the attackers, which allows them to construct new contextual information. This gives rise to new challenges for user privacy protection and often requires improvements on the existing privacypreserving methods. In this paper, we classify contextual information related to LBS query privacy and focus o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 49 publications
0
8
0
Order By: Relevance
“…Damiani et al, [20] surveyed the effect of location sensitivity on the privacy degree of anonymous space and accordingly proposed a solution to sensitive location leak in location sharing application of social networks. Chen and Pang [1] classified background information obtained by attacker into static and dynamic classifications and emphatically analyzed the impact of user's static information including profiles and query dependency on user's privacy, and proposed a corresponding privacy protection method for query privacy protection.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Damiani et al, [20] surveyed the effect of location sensitivity on the privacy degree of anonymous space and accordingly proposed a solution to sensitive location leak in location sharing application of social networks. Chen and Pang [1] classified background information obtained by attacker into static and dynamic classifications and emphatically analyzed the impact of user's static information including profiles and query dependency on user's privacy, and proposed a corresponding privacy protection method for query privacy protection.…”
Section: Related Workmentioning
confidence: 99%
“…It is assumed that current query issued by a user is only affected by his last query and the continuous queries are regarded as a Markov process [1,25], then the query dependency of the current query qj issued by user u with respect to his last query qi is denoted by depu(qi, qj) and can be obtained by the conditional probability pu(qj|qi) as…”
Section: Definition 5 (Query Dependency)mentioning
confidence: 99%
See 1 more Smart Citation
“…Due to its subtle nature, anonymity has been the subject of many research paper. For instance, the proposed definitions aim to capture different aspects of anonymity (either possibilistic [1][2][3][4][5] or probabilistic [6][7][8][9][10][11]). Formal verification of anonymity has been applied to a number of application domains, including electronic voting [12,13], electronic cash protocols [14], file sharing [15,16] and electronic healthcare [17].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, Pan et al [126] added a k-anonymity privacy protection approach to further improve previous methods by protecting user privacy against identity theft. In [33], a more general approach for protecting user privacy is presented by studying the impact of query dependency on user privacy. Cryptography-based location protection methods might provide a better privacy protection, but they suffer from poor performance, and require specific infrastructure, which may not be supported by all LBS providers [67].…”
Section: Previous Resultsmentioning
confidence: 99%