2020
DOI: 10.1109/access.2020.2978488
|View full text |Cite
|
Sign up to set email alerts
|

Achieving User-Defined Location Privacy Preservation Using a P2P System

Abstract: As location-based services become widely used in daily life, there is growing concern in preserving location privacy of users to avoid that attackers infer information about users by collecting and analyzing requests initiated by users. We argue that a good location privacy preservation scheme should have these properties. First, a user should never expose its precise location to any other entity. Second, a user should be able to specify its own requirement on the strength of privacy preservation, since a stri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 53 publications
(61 reference statements)
0
7
0
Order By: Relevance
“…Hence, it is difficult to obtain the trajectory of a vehicle user through LCA. Next, we will prove these analyses through simulation compared with the K-anonymity method [34] and dummy location-based method [45].…”
Section: Location Correlation Attackmentioning
confidence: 96%
See 1 more Smart Citation
“…Hence, it is difficult to obtain the trajectory of a vehicle user through LCA. Next, we will prove these analyses through simulation compared with the K-anonymity method [34] and dummy location-based method [45].…”
Section: Location Correlation Attackmentioning
confidence: 96%
“…The problem of location privacy preservation has been attracting wide attention from both academia and industry, and this problem draws even more attention due to the booming of LBSs. Up to now, many location privacy preservation methods have been proposed, including K-anonymity-based method [33][34][35][36], obfuscation-based method [37][38][39], differential privacy-based method [40,41], homomorphic encryption-based method [42][43][44] and dummy location-based method [6][7][8][9][10][11][12][13]45]. In this work, we focus on the trajectory privacy preservation method based on dummy locations in IoVs.…”
Section: Related Workmentioning
confidence: 99%
“…Another decentralized pri-vacy protection approach is introduced in [15] that allows the nodes to cache POIs data in which they are located in and serves the neighboring queries. A fully distributed architecture is proposed in [16] that allow the user to specify their privacy requirements and to find their cloaking regions without revealing their precise locations. The major limitation of collaboration-based approaches is that mobile devices must have powerful computational capabilities.…”
Section: A Trusted Middle Entity Free Approachesmentioning
confidence: 99%
“…This problem draws even more attention due to the booming of LBSs. Many location privacy-preservation methods have been proposed, such as Kanonymity [7][8][9][10], obfuscation [11][12][13], differential privacy [26,27], mixed zone [28,29], homomorphic encryption [30][31][32], and dummy locations [15][16][17][18][19][20][21][22][23]. In this work, we focus on the location privacy preservation-method based on dummy locations in IoV.…”
Section: Related Workmentioning
confidence: 99%
“…However, K-anonymity privacy-preserving scheme is suitable for high vehicle density. When there are fewer vehicles, spatial anonymity may not be realized, or the anonymous area formed is too large [9]. On the other hand, for the point of interest (POI) retrieval service in IoV, the accuracy of retrieval results is related to the precision of provided location information.…”
Section: Introductionmentioning
confidence: 99%