2016
DOI: 10.1016/j.knosys.2016.03.016
|View full text |Cite
|
Sign up to set email alerts
|

Location privacy-preserving k nearest neighbor query under user’s preference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
24
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(24 citation statements)
references
References 7 publications
0
24
0
Order By: Relevance
“…In Fig. 7, if the LBS user who is located in the cell that is identified by row number five and column number three (i.e., the coordinates C [5,3]) wants to protect his/her location privacy by achieving 4-anonymity level (i.e., k=4), he/she can select three of the cells that are marked by the √ symbol. Since the query probability of any of the three selected cells equals the query probability of the original cell, the attacker cannot determine the real location of the LBS user among the k-1 dummy locations.…”
Section: ) Wise Dummy Selection Location (Wdsl) Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…In Fig. 7, if the LBS user who is located in the cell that is identified by row number five and column number three (i.e., the coordinates C [5,3]) wants to protect his/her location privacy by achieving 4-anonymity level (i.e., k=4), he/she can select three of the cells that are marked by the √ symbol. Since the query probability of any of the three selected cells equals the query probability of the original cell, the attacker cannot determine the real location of the LBS user among the k-1 dummy locations.…”
Section: ) Wise Dummy Selection Location (Wdsl) Approachmentioning
confidence: 99%
“…2) Danger of location homogeneity inference attack If the LBS user selects cells C [5,1], C [4,2], and C [6,3], as shown in Fig. 8, some personal information can be inferred by the attacker without the need to determine the real location of the LBS user.…”
Section: ) Wise Dummy Selection Location (Wdsl) Approachmentioning
confidence: 99%
“…As an essential data‐mining operation, the kNN query can be used as a vital component of many data mining approaches 7 . In the past few years, to support the kNN query over encrypted cloud databases, many types of research have been proposed 7‐19 . Those works usually involve three parties: the cloud server (CS), the database owner (DO), and the query user (QU).…”
Section: Introductionmentioning
confidence: 99%
“…In order to overcome the shortcomings of the centralized structure, more and more researches turn to the models with the distributed structure. For example, [10][11][12][13][14] all adopted the distributed architecture. The distributed structure system is only composed of the mobile terminals and SP.…”
Section: Introductionmentioning
confidence: 99%