2014
DOI: 10.14257/ijsia.2014.8.2.39
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Personalized TTP-free Location Privacy Preserving Method

Abstract: This paper proposes a novel TTP(Trusted ThirdParty

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…As far as AS is concerned, it can obtain user ID and grid offset information H'={(c1,r1),(c2,r2)}. According to the grid offset information, AS cannot directly know user's location information, only the user's id and the relative grid coordinates of the basic grid G. If the AS maliciously acquires the basic grid G, because the user offsets the location and sends it to the AS in a rectangular area, the user can be in any grid point, so the probability that the AS can identify the user's location is (5) When the basic grid is divided more finely, that is, the smaller the r, the larger the anonymous area generated by the user is than MinArea, the attacker needs more cost to identify the exact location of users.…”
Section: Safety Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…As far as AS is concerned, it can obtain user ID and grid offset information H'={(c1,r1),(c2,r2)}. According to the grid offset information, AS cannot directly know user's location information, only the user's id and the relative grid coordinates of the basic grid G. If the AS maliciously acquires the basic grid G, because the user offsets the location and sends it to the AS in a rectangular area, the user can be in any grid point, so the probability that the AS can identify the user's location is (5) When the basic grid is divided more finely, that is, the smaller the r, the larger the anonymous area generated by the user is than MinArea, the attacker needs more cost to identify the exact location of users.…”
Section: Safety Analysismentioning
confidence: 99%
“…In the distributed Point-To-Point scheme, user can search neighboring users by multi-hop communication [5], collecting the location information of neighboring users to construct anonymous regions. After searching other users by multi-hop communication, use also can continues the process of anonymity with the continuous transmission of request [6], so as to finally achieve the purpose of constructing anonymity, which can achieve anonymity as well as allocate consumed time to other adjacent users;…”
Section: Introductionmentioning
confidence: 99%
“…All peers work collaboratively to achieve privacy among untrusted entities. Various algorithms are already proposed as Solanas & Balleste, Rebollo-Monedero, Ardagna etal, Etc [3][4][5][6][7][8][9]. The advantage of this approach is that it does not rely on TTP, it is distributed and also guarantees user's privacy.…”
Section: ) Location Privacymentioning
confidence: 99%