Achieving Effective $k$ -Anonymity for Query Privacy in Location-Based Services

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Achieving Efficient Query Privacy for Location Based Services

Mobile smartphone users frequently need to search for nearby points of interest from a location based service, but in a way that preserves the privacy of the users’ locations. We present a technique for private information retrieval that allows a user to retrieve information from a database server without revealing what is actually being retrieved from the server. We perform the retrieval opera...

متن کامل

Protecting query privacy in location-based services

The popularity of location-based services (LBSs) leads to severe concerns on users’ privacy. With the fast growth of Internet applications such as online social networks, more user information becomes available to the attackers, which allows them to construct new contextual information. This gives rise to new challenges for user privacy protection and often requires improvements on the existing...

متن کامل

A K-Anonymity Based Schema for Location Privacy Preservation

In recent years, with the development of mobile devices, the location based services (LBSs) have become more and more prevailing and most applications installed on these devices call for location information. Yet, the untrusted LBS provider can collect these location information, which may potentially threaten users’ location privacy. In view of this challenge, we propose a two-tier schema for ...

متن کامل

K-Anonymity based Privacy-Preserving location Monitoring Services for Wireless Sensor Networks

Wireless sensor technologies gave rise to many new applications widely used by general citizens as well as military operations. Numerous cases of these applications are based on the information of personal locations. Observations of these locations with untrusted server cause privacy threats to the individuals being monitored. To deal with such a privacy break, the concept of aggregate location...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2017

ISSN: 2169-3536

DOI: 10.1109/access.2017.2766669