2017
DOI: 10.1007/s11277-017-4284-2
|View full text |Cite
|
Sign up to set email alerts
|

An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 56 publications
(36 citation statements)
references
References 47 publications
0
36
0
Order By: Relevance
“…b) The problem statement Location privacy is one of the key issues that needs to be solved. There are various schemas proposed by different researchers [8,9,[18][19][20][21][22][23]. Out of that Collaborative TTP Free model [24][25][26] is one of the best technique to provide highest location privacy.…”
Section: ) Random Chainingmentioning
confidence: 99%
“…b) The problem statement Location privacy is one of the key issues that needs to be solved. There are various schemas proposed by different researchers [8,9,[18][19][20][21][22][23]. Out of that Collaborative TTP Free model [24][25][26] is one of the best technique to provide highest location privacy.…”
Section: ) Random Chainingmentioning
confidence: 99%
“…Several directions of investigation were taken by researchers to mitigate location privacy threats. Various Location Privacy Protection Mechanisms have been proposed [17], [7], [30], [5]. Some of them rely on formal privacy guarantees such as k-anonymity [31] or differential privacy [12], some of them target sensitive information and try to hide them (e.g., POIs.…”
Section: Related Workmentioning
confidence: 99%
“…To tackle these threats, many Location Privacy Protection Mechanisms (LPPMs) were proposed in the literature. LPPMs protect user location information by relying on a wide variety of techniques such as perturbation, generalization and fake data generation [17].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it becomes difficult for the third party to identify the actual user [21]. Research shows that constructing the cloak of user location does not ensure the absolute user privacy [22], however, [23] [24] propose another alternatives using TTP based and TTP free architectures.…”
Section: Literature Reviewmentioning
confidence: 99%