Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems 2009
DOI: 10.1145/1653771.1653808
|View full text |Cite
|
Sign up to set email alerts
|

Distortion-based anonymity for continuous queries in location-based mobile services

Abstract: Privacy preservation has recently received considerable attention for location-based mobile services. Various location cloaking approaches have been proposed to protect the location privacy of mobile users. However, existing cloaking approaches are ill-suited for continuous queries. In view of the privacy disclosure and poor QoS (Quality of Service) under continuous query anonymization, in this paper, we propose a δp-privacy model and a δq-distortion model to balance the tradeoff between user privacy and QoS. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 60 publications
(31 citation statements)
references
References 15 publications
0
31
0
Order By: Relevance
“…[12] proposes spatial cloaking using the memorization prop-erty for continuous queries. This is further used in [30] for clustering queries with similar mobility patterns. However, this type of techniques may lead to large cloaking boxes resulting in higher query processing cost as users may not always move together.…”
Section: Related Workmentioning
confidence: 99%
“…[12] proposes spatial cloaking using the memorization prop-erty for continuous queries. This is further used in [30] for clustering queries with similar mobility patterns. However, this type of techniques may lead to large cloaking boxes resulting in higher query processing cost as users may not always move together.…”
Section: Related Workmentioning
confidence: 99%
“…[14] proposes spatial cloaking using the memorization property for continuous queries. This is further used in [36] for clustering queries with similar mobility patterns. However, as discussed earlier, this type of techniques may lead to large cloaking boxes resulting in higher query processing cost as users may not always move together.…”
Section: Related Workmentioning
confidence: 99%
“…Spatial cloaking techniques over trajectory can be categorized into three kinds: group-based [15], distortion-based [16] and prediction-based [12], where the first two are proposed for real-time trajectories while the last one is for historical trajectories. Recent work GCCA (Grid-based Continuous Cloaking Area) [9] propose to generate cloaking area with expand-reduce phase and obtain an improved performance over Advance KAA (K-Anonymity Area) method [17].…”
Section: Related Workmentioning
confidence: 99%