2017
DOI: 10.1016/j.jnca.2016.10.011
|View full text |Cite
|
Sign up to set email alerts
|

Efficient location privacy algorithm for Internet of Things (IoT) services and applications

Abstract: Location-based Services (LBS) have become a very important area for research with the rapid development of Internet of Things (IoT) technology and the ubiquitous use of smartphones and social networks in our daily lives. Although users can enjoy a lot of flexibility and conveniences from the LBS with IoT, they may also lose their privacy. Untrusted or malicious LBS servers with all users' information can track users in various ways or release personal data to third parties. In this work, we first analyze the c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
63
0
10

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 141 publications
(75 citation statements)
references
References 52 publications
0
63
0
10
Order By: Relevance
“…Zero-Knowledge technique [65] would be the best solution for anonymity but it has a drawback that having a large processing power because of strong algorithm it cannot be implemented on the devices which have less consumption power. So K-anonymity is a best approach for less power physical devices in IoT network [66].…”
Section: ) Privacy Of Sensitive Informationmentioning
confidence: 99%
“…Zero-Knowledge technique [65] would be the best solution for anonymity but it has a drawback that having a large processing power because of strong algorithm it cannot be implemented on the devices which have less consumption power. So K-anonymity is a best approach for less power physical devices in IoT network [66].…”
Section: ) Privacy Of Sensitive Informationmentioning
confidence: 99%
“…While data captured by sensors is useful for service provisioning, it has significant privacy implications. Several studies [9,12,40] have recently highlighted how sensor data can lead to unexpected inferences about individuals and their behavior. Regulations, such as General Data Protection Regulation (GDPR) [1], California Online Privacy Protection Act (CalOPPA) [2], and California Consumer Privacy Act (CCPA) [3], have imposed several requirements on the organizations in which they can retain their user data.…”
Section: Introductionmentioning
confidence: 99%
“…As the data accumulated, the EHRs of the patients become medical big data with high volume, which faces a lot of challenges, such as the information privacy, search, updating and sharing. It is emergent to design a privacy-preserving e-health system for the fusion of IoT and medical big data [4,5,6], which handles these challenges.…”
Section: Introductionmentioning
confidence: 99%