2020
DOI: 10.1155/2020/8892954
View full text |Buy / Rent full text
|
Sign up to set email alerts
|

Abstract: In spatiotemporal crowdsourcing applications, sensing data uploaded by participants usually contain spatiotemporal sensitive data. If application servers publish the unprocessed sensing data directly, it is easy to expose the privacy of participants. In addition, application servers usually adopt the static publishing mechanism, which is easy to produce problems such as poor timeliness and large information loss for spatiotemporal crowdsourcing applications. Therefore, this paper proposes a spatiotemporal priv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 39 publications
(42 reference statements)
0
3
0
Order By: Relevance
“…Therefore, it is crucial the protection of spatio-temporal information. To avoid background knowledge and homogeneity attacks, the time attribute may be added in the de-identification of the location attribute [101]. In continuous data release, outliers are also a problem.…”
Section: Dynamic Datamentioning
confidence: 99%
“…Therefore, it is crucial the protection of spatio-temporal information. To avoid background knowledge and homogeneity attacks, the time attribute may be added in the de-identification of the location attribute [101]. In continuous data release, outliers are also a problem.…”
Section: Dynamic Datamentioning
confidence: 99%
“…But the encryption protocol application process is too complicated. 31 More importantly, they are not suitable for mobile devices. But the differential privacy disturbance mechanisms are adapted to these situations.…”
Section: Related Workmentioning
confidence: 99%
“…Zhou et al 30 used homomorphic encryption technology which belongs the symmetric encryption technology to ensure the security of data transmission. But the encryption protocol application process is too complicated 31 . More importantly, they are not suitable for mobile devices.…”
Section: Related Workmentioning
confidence: 99%