2018
DOI: 10.1155/2018/4607464
|View full text |Cite
|
Sign up to set email alerts
|

Double Cache Approach with Wireless Technology for Preserving User Privacy

Abstract: Several methods use cache for decreasing the number of connections to protect privacy of user data and improve performance in Location Based Services (LBS). Many of these methods require users to trust other users or third parties, which could be servers. An intruder could be disguised as a user or a third party. In this article, we propose a new method, known as “Double Cache Approach”, which uses a pair of caches to reduce the vulnerability of trust between users or third party and offers a vast improvement … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 39 publications
(62 reference statements)
0
13
0
Order By: Relevance
“…The Double Cache Approach (DCA) uses two parts of the cache within the access point; the first part exchanges the queries between the peers whilst the second part stores the results of these queries [40]. This approach attempts to overcome the trust factor between the peers by shifting it to the access point.…”
Section: B Hybrid Privacy Protection Approachesmentioning
confidence: 99%
See 4 more Smart Citations
“…The Double Cache Approach (DCA) uses two parts of the cache within the access point; the first part exchanges the queries between the peers whilst the second part stores the results of these queries [40]. This approach attempts to overcome the trust factor between the peers by shifting it to the access point.…”
Section: B Hybrid Privacy Protection Approachesmentioning
confidence: 99%
“…In essence, the Double Obfuscation Approach (DOA) integrates the Obfuscation and TTP approaches, with other techniques namely fog cache and mix-zone to achieve better protection for the users than when each approach is used separately. Our approach is then validated against three modern hybrid techniques, which are used as a comparison benchmark, namely the Enhanced Cache [38], P2PCache [39], and DCA Double Cache [40].…”
Section: B Hybrid Privacy Protection Approachesmentioning
confidence: 99%
See 3 more Smart Citations