2019
DOI: 10.1109/access.2019.2911107
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Smart Anonymity Scheme for Security Collaborative Enhancement in Location-Based Services

Abstract: Security enhancement is and always will be a prime concern for the deployment of pointof-interest (POI) recommendation services in mobile sensing environment. Recent tamper-proof technical protection such as strong encryption has undoubtedly become a major safeguard against threats to privacy in location-based services. Although the disclosure of location information could increase recommendation accuracy, the publication of trajectory data to untrusted entities could reveal sensitive details, e.g., daily rout… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…Partovi et al [18] modeled a Markov decision process and introduced a new location privacy measurement method to ensure that the users' specified privacy level could be achieved in an infinite time range. The k-anonymity method mainly used in Wu et al [19] to enhance privacy protection, and used clustering technology to group users by learning their trajectory data. A graph based trajectory data representation model [20] was proposed, the similarity between trajectories was calculated using the measurement method based on edges and vertices, and similar trajectories were clustered and identified based on paths.…”
Section: Related Workmentioning
confidence: 99%
“…Partovi et al [18] modeled a Markov decision process and introduced a new location privacy measurement method to ensure that the users' specified privacy level could be achieved in an infinite time range. The k-anonymity method mainly used in Wu et al [19] to enhance privacy protection, and used clustering technology to group users by learning their trajectory data. A graph based trajectory data representation model [20] was proposed, the similarity between trajectories was calculated using the measurement method based on edges and vertices, and similar trajectories were clustered and identified based on paths.…”
Section: Related Workmentioning
confidence: 99%
“…A risk model and taxonomy attack are provided to elucidate the vulnerabilities in the cloud. Researchers will be able to release and immerse themselves in cloud-based Intrusion Detection approaches as a result of this work [9]. DDoS attacks have caused substantially vandalized cloud computing, also rate of failures of current DDoS attack detection approaches are comparatively large in cloud environments.…”
Section: Related Workmentioning
confidence: 99%
“…Kuang et al [41] propose the Location Privacy Requirements, and represented it with a triplet <K, L, H>, where H denotes the privacy coefficient, the smaller it is, the narrower the scope of the candidate grid area will be, resulting in the enhancement of the utility and the decline of privacy, unfortunately, due to its tendentious implementing way, the trade-off problem is still unresolved. Combining kanonymity and clustering techniques, Wu et al [12] propose the anonymizer coordination strategy to ensures that the anonymizers always provide strong privacy protection and good service for the recommendation service. To further provide personalized privacy service, Casper's novel privacy framework in [8] is divided into two parts: the location anonymizer and the privacy-aware query processor; the former generates the cloaking regions to protect exact user location, the other is designed to deal with anonymous queries.…”
Section: Related Workmentioning
confidence: 99%
“…In this way, the anonymous process is implemented more effectively, e.g., [2] utilizes the Markov model to predict query location first before selecting anonymous cells, which reduces the interaction between users and location service provider (LSP) and improves user privacy. Besides, to provide mobile users with more effective privacy protection, many related works also focus on achieving the right trade-off between privacy and utility [7][8][9][10][11][12]. Such mechanisms generally apply the Weighted Sum Method (WSM) to balance the privacy and utility, i.e., the trade-off between privacy and utility can be achieved through parameter adjusting.…”
Section: Introductionmentioning
confidence: 99%