2012
DOI: 10.1145/2188379.2188382
|View full text |Cite
|
Sign up to set email alerts
|

A novel location privacy framework without trusted third party based on location anonymity prediction

Abstract: Location-based services are becoming increasingly popular with the proliferation of location aware devices. It is not possible to access location-based services and preserve privacy at the same time when the user provides exact location information. Cloaking or obfuscating location data is the only way to protect location-privacy. To do that, most of the systems use third party location anonymizer. In this paper, we propose a novel location privacy framework without any trusted third party (TTP). Most of the e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…The techniques in this category generalized the actual location into a cloaked spatial regions which were guaranteed to satisfy the k-anonymity. (3) Encryption [24]. The main idea was to provide effective location privacy preserving without the assistance of Trusted Third Party (TTP).…”
Section: Location Privacy Preservingmentioning
confidence: 99%
“…The techniques in this category generalized the actual location into a cloaked spatial regions which were guaranteed to satisfy the k-anonymity. (3) Encryption [24]. The main idea was to provide effective location privacy preserving without the assistance of Trusted Third Party (TTP).…”
Section: Location Privacy Preservingmentioning
confidence: 99%
“…In this framework, the trusted anonymizer located between the user and the LSP blurs the user's exact location and transforms the query candidates. (2) two-tier framework [13,21,27,[22][23][24][25][26]. In this framework, the user can directly contract with the LSP through using space transformation [13], Private Information Retrieval (PIR) [21], probabilistic anonymity [26] or peer-to-peer (P2P) model [22][23][24][25][26].…”
Section: Related Workmentioning
confidence: 99%
“…Goryczka et al present a TTP-dependent CPPDP scheme that achieves --anonymity. However, TTP does not always exist in the real world [14,15]. This is especially true in aftermath Edward Snowden's revelation that the US Government has been conducting large-scale government surveillance (http://masssurveillance.info/).…”
Section: Introductionmentioning
confidence: 99%