2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE) 2012
DOI: 10.1109/csae.2012.6272944
|View full text |Cite
|
Sign up to set email alerts
|

Protecting user anonymity in location-based services with fragmented cloaking region

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 11 publications
0
16
0
Order By: Relevance
“…For instance, a random position in the legitimate range is reported back instead of the exact location of the user, as long as the user is still in the permitted area. Spatial cloaking [34][35][36], also referred to as location cloaking or location blurring, is a technique used to blur the user's exact location with a bigger area, called a "cloaked region." It is reported that location privacy depends strongly on the size of the cloaked region.…”
Section: Monitoring and Trackingmentioning
confidence: 99%
“…For instance, a random position in the legitimate range is reported back instead of the exact location of the user, as long as the user is still in the permitted area. Spatial cloaking [34][35][36], also referred to as location cloaking or location blurring, is a technique used to blur the user's exact location with a bigger area, called a "cloaked region." It is reported that location privacy depends strongly on the size of the cloaked region.…”
Section: Monitoring and Trackingmentioning
confidence: 99%
“…When a user makes a server request, the anonymous server will use the locations of other users in the group to which it belongs to construct the anonymous region. Subsequently, Li and Zhu [34] also used the method of regionalization to research on reducing the area of anonymous regions and improving the quality of service. e anonymous server firstly constructs an anonymous region containing k users and then removes the anonymous regions that do not contain the users according to relationship among the users' locations to form multiple anonymous subregions that do not intersect each other.…”
Section: Related Workmentioning
confidence: 99%
“…Protecting the user privacy with locationanonymity, however, is not enough to protect her or his location information when the users are located within an area small enough to locate the user precisely. Location obfuscation approach [3][4][5] is used to decrease the precision of a position so that the attacker can only receive coarse-grained position information. A cloaked region, which is larger than a user-specified threshold, called minimum acceptable area, will be sent to the service provider instead of the exact location.…”
Section: Introductionmentioning
confidence: 99%