2012
DOI: 10.1002/cpe.2844
|View full text |Cite
|
Sign up to set email alerts
|

Hilbert‐order based spatial cloaking algorithm in road network

Abstract: Location-based services (LBSs) are currently some of the fastest growing information technology industries. User privacy in LBSs has attracted great interest in the research community. However, the proliferation of position identifying devices has become an increasing privacy threat for users in LBSs. It is very difficult to avoid the privacy threat of a user in processing his/her request because the user has to submit his/her exact location with a query to the LBS. To protect privacy in road networks, the exi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 23 publications
0
12
0
Order By: Relevance
“…As a result, X-star [14] and other works [15][16] blur the user's exact location into a set of segments, and the number of the segments is the degree of L-diversity. In reality, the cloaking region can contain some semantic places together with road segments, and the semantic information may leak the user's privacy.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, X-star [14] and other works [15][16] blur the user's exact location into a set of segments, and the number of the segments is the degree of L-diversity. In reality, the cloaking region can contain some semantic places together with road segments, and the semantic information may leak the user's privacy.…”
Section: Related Workmentioning
confidence: 99%
“…end if 16) end if 17) end for each 18) if (kNum == kNum before ) then 19) if ( , so it continues to call algorithm 2_2. In searching step 1, due to the type of every possible adjacent vertex is intersection, any intersection (e.g., v 2 ) is selected (Figure 2(b) …”
Section: )mentioning
confidence: 99%
“…On the other hand, most of previous location privacy preserving methods [3], [8] rely on a centralized trusted third party (TTP). A mobile user (requestor) sends its geographic location and query requirement to the centralized trusted anonymizing proxy.…”
Section: Introductionmentioning
confidence: 99%
“…Though it is appropriate for preventing location based identity inference, the location value of a mobile user is likely to be revealed in a small cloaking region. Hilbert curve is also used for computing cloaking region in a road network [8]. Researches in [10,11,21] concentrate on location privacy of moving users.…”
Section: Related Workmentioning
confidence: 99%
“…For computing a cloaking region, methods based on k-anonymity, l-diversity or cloaking granularity hold different privacy metrics. k-anonymity based methods [4][5][6][7][8][9][10] extend a cloaking region until 'k-1' other users are included. l-diversity based methods extend the cloaking region until 'l-1' different locations are included.…”
Section: Introductionmentioning
confidence: 99%