2020
DOI: 10.1109/access.2020.3009200
|View full text |Cite
|
Sign up to set email alerts
|

A Double Obfuscation Approach for Protecting the Privacy of IoT Location Based Applications

Abstract: Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the privacy and security of users' personal data. Although existing research provides a myriad of methods to improve and protect user privacy in LBS applications, most of these methods are concerned with handling static queries and non-mobile objects only. Moreove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 39 publications
(17 citation statements)
references
References 45 publications
0
16
0
Order By: Relevance
“…Here we provide a comparison of the SPF method with those which use a dummy (Enhance-Cache) [36], cooperation among peers P2PCache [45], encryption and TP (BTP) [33], and Double Obfuscation Approach DOA [34]. All of these approaches also use the cache technique.…”
Section: Comparison Experiments and Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Here we provide a comparison of the SPF method with those which use a dummy (Enhance-Cache) [36], cooperation among peers P2PCache [45], encryption and TP (BTP) [33], and Double Obfuscation Approach DOA [34]. All of these approaches also use the cache technique.…”
Section: Comparison Experiments and Simulation Resultsmentioning
confidence: 99%
“…Accordingly, advanced methods based on the trust of the SP should have an inbuilt system to alert users to grant permission for their data to be accessed [32]. How to avoid dependence on the trust of the SP has been an open problem, which has recently been addressed in the Blind Approach [33] by way of using a pair of keys in addition to the third party, and in the Double Obfuscation Approach (DOA) [34].…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Several studies were conducted on mobility management in IoT systems [ 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 ]. These can be categorized into: (1) mobility management for an individual device [ 12 , 13 , 14 , 15 , 16 ]; (2) mobility management for a group of devices [ 17 , 18 , 19 , 20 , 21 , 22 , 23 ]; and (3) mobility management for the privacy of devices [ 24 , 25 , 26 , 27 ].…”
Section: Related Workmentioning
confidence: 99%