2016
DOI: 10.1155/2016/6182769
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving Location-Based System for Continuous Spatial Queries

Abstract: K-anonymization generated a cloaked region (CR) that was K-anonymous; that is, the query issuer was indistinguishable from K-1 other users (nearest neighbors) within the CR. This reduced the probability of the query issuer’s location being exposed to untrusted parties (1/K). However, location cloaking is vulnerable to query tracking attacks, wherein the adversary can infer the query issuer by comparing the two regions in continuous LBS queries. This paper proposes a novel location cloaking method to resist thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 27 publications
0
4
0
Order By: Relevance
“…The simulation scenario in this portion was defined, and then the outcomes of the simulations were interpreted. The results were also compared with the fixed K-anonymization (Kf) [27] and active fixed K-anonymization (A-Kf) [28]. The simulation tool, Riverbed Modeler [37], was used to execute the simulations.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The simulation scenario in this portion was defined, and then the outcomes of the simulations were interpreted. The results were also compared with the fixed K-anonymization (Kf) [27] and active fixed K-anonymization (A-Kf) [28]. The simulation tool, Riverbed Modeler [37], was used to execute the simulations.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…Currently, the PLAM algorithms based on ldiversity and k-anonymity need to be checked on the route, unless there are more uncontrollable factors to be tested, such as the 4G network power. In [27], the authors elaborated on the location-cloaking approach to avoid the occurrence of aggression and to reduce the possibility of disclosing the position of the requesting issuer to untrusted parties (1/k). Location cloaking is accessible to query tracking attacks, where the opponent can determine the querier by comparing the two sectors in the LBS queries.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [24] a fast continuous query privacy-preserving framework in road networks is recommended, based on the concepts of both k-anonymity and l-diversity. The authors in [25] propose a method to make location cloaking less vulnerable to query tracking attacks. The proposed method is applied on road networks, such as subways, railways, and highways, where the road network is known and fixed, except for the trajectories.…”
Section: Efficient Privacy Preserving K-nn Queriesmentioning
confidence: 99%