Computer Science ›› 2023, Vol. 50 ›› Issue (5): 348-354.doi: 10.11896/jsjkx.220300207
• Information Security • Previous Articles Next Articles
TU Sipan, ZHANG Lin, LIU Xiping
CLC Number:
[1]WAN S,LI F H,NIU B,et al.Research progress on locationprivacy-preserving techniques[J].Journal on Communications,2016,37(12):124-141. [2]XU J,TANG X,HU H,et al.Privacy-conscious location-based queries in mobile environments[J].IEEE Transactions on Parallel and Distributed Systems,2009,21(3):313-326. [3]LI X,MIAO M,LIU H,et al.An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism[J].Soft Computing,2017,21(14):3907-3917. [4]YING B,MAKRAKIS D.Protecting location privacy with clustering anonymization in vehicular networks[C]//2014 IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS).IEEE,2014:305-310. [5]HARA T,SUZUKI A,IWATA M,et al.Dummy-based user lo-cation anonymization under real-world constraints[J].IEEE Access,2016,4:673-687. [6]LU H,JENSEN C S,YIU M L.Pad:privacy-area aware,dummy-based location privacy in mobile services[C]//Proceedings of the Seventh ACM International Workshop on Data Enginee-ring for Wireless and Mobile Access.2008:16-23. [7]NIU B,LI Q,ZHU X,et al.Achieving k-anonymity in privacy-aware location-based services[C]//IEEE INFOCOM 2014-IEEE Conference on Computer Communications.IEEE,2014:754-762. [8]GRUTESER M,GRUNWALD D.Anonymous usage of loca-tion-based services through spatial and temporal cloaking[C]//Proceedings of the 1st International Conference on Mobile Systems,Applications and Services.2003:31-42. [9]CHOW C Y,MOKBEL M F,AREF W G.Casper* Query processing for location services without compromising privacy[J].ACM Transactions on Database Systems(TODS),2009,34(4):1-48. [10]KALNIS P,GHINITA G,MOURATIDIS K,et al.Preventinglocation-based identity inference in anonymous spatial queries[J].IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733. [11]KIDO H,YANAGISAWA Y,SATOH T.An anonymous communication technique using dummies for location-based services[C]//Proceedings of the International Conference on Pervasive Services(ICPS'05).IEEE,2005:88-97. [12]WU Z,LI G,SHEN S,et al.Constructing dummy query se-quences to protect location privacy and query privacy in location-based services[J].World Wide Web,2021,24(1):25-49. [13]CHEN S,SHEN H.Semantic-aware dummy selection for location privacy preservation[C]//2016 IEEE Trustcom/BigDataSE/ISPA.IEEE,2016:752-759. [14]WANG J,WANG C R,MA J F,et al.Dummy location selectionalgorithm based on location semantics and query probability[J].Journal on Communications,2020,41(3):53-61. [15]LI B,ZHU H,XIE M.Quantifying location privacy risks underheterogeneous correlations[J].IEEE Access,2021,9:23876-23893. [16]ZHANG A,LI X H,LI B,et al.Location Privacy DesensitizationAlgorithm Based On Dummy Location Selection[J].Application Research of Computers,2022,39(5):1551-1556. [17]ZHANG L,ZHANG H G,LIU Q P,et al.A dummy locationscreening algorithm based on multivariate data[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science),2021,41(6):47-56. [18]ZHOU J Q,LI Y J.Personalized Dummy Generation MethodBased on Spatiotemporal Correlations and Location Semantics[J].Journal of Software,2019,30(S1):18-26. [19]LIU H,LI X,LI H,et al.Spatiotemporal correlation-awaredummy-based privacy protection scheme for location-based ser-vices[C]//IEEE INFOCOM 2017-IEEE Conference on Computer Communications.IEEE,2017:1-9. [20]SINWAR D,KAUSHIK R.Study of Euclidean and Manhattandistance metrics using simple k-means clustering[J].International Journal for Research in Applied Science and Engineering Technology,2014,2(5):270-274. [21]ZHENG Y,ZHANG L,XIE X,et al.Mining interesting loca-tions and travel sequences from GPS trajectories[C]//Procee-dings of the 18th International Conference on World Wide Web.2009:791-800. [22]ZHENG Y,LI Q,CHEN Y,et al.Understanding mobility based on GPS data[C]//Proceedings of the 10th International Confe-rence on Ubiquitous Computing.2008:312-321. |
[1] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[2] | ZHANG Xue-jun, YANG Hao-ying, LI Zhen, HE Fu-cun, GAI Ji-yang, BAO Jun-da. Differentially Private Location Privacy-preserving Scheme withSemantic Location [J]. Computer Science, 2021, 48(8): 300-308. |
[3] | WANG Hui, ZHU Guo-yu, SHEN Zi-hao, LIU Kun, LIU Pei-qian. Dummy Location Generation Method Based on User Preference and Location Distribution [J]. Computer Science, 2021, 48(7): 164-171. |
[4] | WANG Le-ye. Geographic Local Differential Privacy in Crowdsensing:Current States and Future Opportunities [J]. Computer Science, 2021, 48(6): 301-305. |
[5] | ZHOU Yi-hua, LI Guang-hui, YANG Yu-guang, SHI Wei-min. Location Privacy Preserving Nearest Neighbor Querying Based on GeoHash [J]. Computer Science, 2019, 46(8): 212-216. |
[6] | HUANG De-ling,YAN Yu-song,PENG Da-qin. Geographic Routing Protocol Based on Prediction for Urban Vehicular Ad Hoc Networks [J]. Computer Science, 2019, 46(7): 74-80. |
[7] | WU Dan-dan, LYU Xin. Location Anonymous Algorithm Based on User Collaboration under Distributed Structure [J]. Computer Science, 2019, 46(4): 158-163. |
[8] | TONG Hai,BAI Guang-wei,SHEN Hang. Double-auction-based Incentive Mechanism for k-anonymity [J]. Computer Science, 2019, 46(3): 202-208. |
[9] | WU Zhong-zhong, LV Xin and LI Xin. Query Probability Based Dummy Location Selection Algorithm [J]. Computer Science, 2018, 45(5): 143-146. |
[10] | XIONG Wan-zhu, LI Xiao-yu. Mobile Location Privacy Protection Based on Anonymous Routing [J]. Computer Science, 2018, 45(10): 142-149. |
[11] | DAI Jia-zhu and HUA Liang. Method of Anonymous Area Generation for Sensitive Location Protection under Road Networks [J]. Computer Science, 2016, 43(3): 137-144. |
[12] | WANG Peng-fei, LI Qian-mu and ZHU Bao-ping. Location Privacy Protection Method Based on Incremental Nearest Neighbor Query [J]. Computer Science, 2015, 42(3): 158-161. |
[13] | WANG Jia-hui and CHENG Jiu-jun. Spatial Cloaking Algorithm Based on Grid Expansion in P2P Mode [J]. Computer Science, 2014, 41(4): 90-94. |
[14] | ZHAO Ping,MA Chun-guang,GAO Xun-bing and ZHU Wei. Protecting Location Privacy with Voronoi Diagram over Road Networks [J]. Computer Science, 2013, 40(7): 116-120. |
[15] | CHEN Yu-feng,LIU Xue-jun and LI Bin. Collaborative Position Privacy Protection Method Based on Game Theory [J]. Computer Science, 2013, 40(10): 92-97. |
|