2017
DOI: 10.1109/jiot.2016.2553083
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services

Abstract: With the pervasiveness of mobile devices and the development of wireless communication technique, location-based services (LBS) have made our life more convenient, and the polygons spatial query, which can provide more flexible LBS, has attracted considerable interest recently. However, the flourish of polygons spatial query still faces many challenges including the query information privacy. In this paper, we present an efficient and privacy-preserving polygons spatial query framework for location-based servi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
43
0

Year Published

2017
2017
2025
2025

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(43 citation statements)
references
References 28 publications
0
43
0
Order By: Relevance
“…Although schemes [20][21][22][23] are able to calculate the average sensory data in each data dimension, they bring heavy computation costs and communication overhead. In addition, the query vehicle usually wants to know the road conditions of the potential moving route, which could lead to that the query location being disclosed in the data query process, the schemes in [23][24][25][26][27] have been proposed to solve this problem.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although schemes [20][21][22][23] are able to calculate the average sensory data in each data dimension, they bring heavy computation costs and communication overhead. In addition, the query vehicle usually wants to know the road conditions of the potential moving route, which could lead to that the query location being disclosed in the data query process, the schemes in [23][24][25][26][27] have been proposed to solve this problem.…”
Section: Related Workmentioning
confidence: 99%
“…The oblivious transfer [24,25], homomorphic encryption technology [26,27], and proxy re-encryption technique [23] have been exploited to hide the query location. However, it is worth noting that the computation and communication costs by the schemes [24,25] is directly proportional to the data dimension, the schemes [26,27] do not support the scenario with high vehicle density, and the scheme [23] needs heavy computation and communication costs.…”
Section: Introductionmentioning
confidence: 99%
“…Hui Zhu, Fen Liu, Hui Li et.al [9] presented an efficient approach as a framework for the security threats in Internet of Things for the location based scenarios. As the mobile technology is increasing day by day and the advancement of wireless communication skill, location constructed facilities have made human life more suitable, and they have provided polygons longitudinal interrogation, which is able to provide more flexible approach and consumes substantial interest freshly.…”
Section: Mahmud Hossain Maziar Fotouhi and Ragibmentioning
confidence: 99%
“…Many upright sections are predictable to knowledge a double digit evolution in upcoming centuries. The most forthcoming vertical solicitation provinces are consumer electronics, automotive productions, healthcare and intelligent constructions and conveniences [7][8] [9]. Some few examples related to the Internet of Things.…”
Section: Introductionmentioning
confidence: 99%
“…In this scenario, to protect users' privacy, researchers have presented a variety of methods like privacy policy [5,6], distortion, encryption [7][8][9][10][11], and so on. Among these methods, distortion techniques, such as pseudonym, obfuscation, and dummy, are most widely used to protect privacy.…”
Section: Introductionmentioning
confidence: 99%