Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain
نویسندگان
چکیده
منابع مشابه
Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain
Currently, although prevalent location privacy methods based on k-anonymizing spatial regions (K-ASRs) can achieve privacy protection by sacrificing the quality of service (QoS), users cannot obtain accurate query results. To address this problem, it proposes a new location privacy-preserving k-anonymity method based on the credible chain with two major features. First, the optimal k value for ...
متن کاملResearch on Privacy Preserving on K-anonymity
The disclosure of sensitive information has become prominent nowadays; privacy preservation has become a research hotspot in the field of data security. Among all the algorithms of privacy preservation in data mining, K-anonymity is a kind of common and valid algorithm in privacy preservation, which can effectively prevent the loss of sensitive information under linking attacks, and it is widel...
متن کاملPrivacy-Preserving Distributed k-Anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous data, the model has been that of a single source wanting to publish data. This paper presents a k-anonymity protocol when the data is vertically partitioned between sites. A key contribution is a proof that the proto...
متن کاملK-Anonymity based Privacy-Preserving location Monitoring Services for Wireless Sensor Networks
Wireless sensor technologies gave rise to many new applications widely used by general citizens as well as military operations. Numerous cases of these applications are based on the information of personal locations. Observations of these locations with untrusted server cause privacy threats to the individuals being monitored. To deal with such a privacy break, the concept of aggregate location...
متن کاملA K-Anonymity Based Schema for Location Privacy Preservation
In recent years, with the development of mobile devices, the location based services (LBSs) have become more and more prevailing and most applications installed on these devices call for location information. Yet, the untrusted LBS provider can collect these location information, which may potentially threaten users’ location privacy. In view of this challenge, we propose a two-tier schema for ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ISPRS International Journal of Geo-Information
سال: 2017
ISSN: 2220-9964
DOI: 10.3390/ijgi6060163