2015
DOI: 10.1016/j.future.2014.10.026
|View full text |Cite
|
Sign up to set email alerts
|

A novel attack to spatial cloaking schemes in location-based services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
50
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 47 publications
(50 citation statements)
references
References 32 publications
0
50
0
Order By: Relevance
“…Rebollo et al [14] further this conception in query anonymity, and utilized entropy to select the optimal submitting user [25]. Niu et al [15] proposed a Variance-Based Attack (VBA) to successfully attack the existing algorithms, then they proposed a random walk-based cloaking algorithm to remedy drawbacks of these algorithms.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Rebollo et al [14] further this conception in query anonymity, and utilized entropy to select the optimal submitting user [25]. Niu et al [15] proposed a Variance-Based Attack (VBA) to successfully attack the existing algorithms, then they proposed a random walk-based cloaking algorithm to remedy drawbacks of these algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…The aims of this paper can be described as to resist the potential correlation attack, take advantage over the collaborative user scheme [14,15] and achieve the query ldiversity [16] and time interval consistency. Based on these purposes, a user collaborative mix-zone (short for CoMix) is proposed.…”
Section: Introductionmentioning
confidence: 99%
“…(1) Avoid VBAs [3] in the center location of the pseudoobfuscation area generated for the user's location.…”
Section: Producing the Obfuscation Areas Of Multiplementioning
confidence: 99%
“…However, the approaches proposed in those studies search for − 1 conspirators surrounding the user, which may enable attackers to triangulate a user within an obfuscation area (OA) and deploy a variance-based attack (VBA) [3]. In [3], an approach was proposed that searches for other conspirators surrounding a user. Subsequently, a random conspirator in the group is selected to search for other conspirators.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation