2022 3rd Information Communication Technologies Conference (ICTC) 2022
DOI: 10.1109/ictc55111.2022.9778536
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy Protection Method Based on Geohash Coding and Pseudo-Random Sequence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Wei [ 26 ] achieves location retrieval in the neighborhood POI problem by Geohash encoding the user’s spatial two-dimensional coordinates while hiding the user’s exact location. Liu et al [ 27 ] used the Geohash code and pseudo-random sequence selection algorithm to select the geographical intervals involved in anonymous hiding from the location set and designed a k-anonymous location privacy protection scheme. Ye et al [ 28 ] proposed a proximity detection method based on Geohash for privacy preservation.…”
Section: Related Workmentioning
confidence: 99%
“…Wei [ 26 ] achieves location retrieval in the neighborhood POI problem by Geohash encoding the user’s spatial two-dimensional coordinates while hiding the user’s exact location. Liu et al [ 27 ] used the Geohash code and pseudo-random sequence selection algorithm to select the geographical intervals involved in anonymous hiding from the location set and designed a k-anonymous location privacy protection scheme. Ye et al [ 28 ] proposed a proximity detection method based on Geohash for privacy preservation.…”
Section: Related Workmentioning
confidence: 99%
“…Gao et al [45] encoded trajectories covering different grids and designed Geohash-Tree query trees to speed up the efficiency of querying. Liu et al [46] proposed a location privacy protection scheme combining Geohash and pseudo-random sequence techniques. Xing et al [47] designed the G-Casper scheme, which uses the user's Geohashencoded location grid and its surrounding eight grids as candidate grids, and selected one or more grids to construct the hidden intervals through the processing the random grid numbering, checking the number of users, and pruning.…”
Section: Research On Geohash In Location Services and Privacy Protectionmentioning
confidence: 99%