2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN) 2018
DOI: 10.1109/msn.2018.00030
|View full text |Cite
|
Sign up to set email alerts
|

Research on Co-Location Privacy-Preserving System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Considering the impact of the environment on location privacy when the system is threatened, [23] proposes a new location privacy metric related to the surrounding environment, and a stochastic model that can capture spatial changes along the user path, and develops a new stop-based best LBS access scheme. [24] proposed a co-location privacypreserving system framework, the key technologies of the system is location privacy-preserving agent. It defines novel calculation method of relation strength based on bi-direction interaction frequency between user and friends, and designs two algorithms based on user's coordination and co-location information concealment and time adjustment which is suitable for different location privacy-preserving scenarios, but It uses a centralized location protection method that is vulnerable to malicious attacks by attackers.…”
Section: Related Workmentioning
confidence: 99%
“…Considering the impact of the environment on location privacy when the system is threatened, [23] proposes a new location privacy metric related to the surrounding environment, and a stochastic model that can capture spatial changes along the user path, and develops a new stop-based best LBS access scheme. [24] proposed a co-location privacypreserving system framework, the key technologies of the system is location privacy-preserving agent. It defines novel calculation method of relation strength based on bi-direction interaction frequency between user and friends, and designs two algorithms based on user's coordination and co-location information concealment and time adjustment which is suitable for different location privacy-preserving scenarios, but It uses a centralized location protection method that is vulnerable to malicious attacks by attackers.…”
Section: Related Workmentioning
confidence: 99%