2015
DOI: 10.1007/s00500-015-1703-8
|View full text |Cite
|
Sign up to set email alerts
|

Long-term location privacy protection for location-based services in mobile cloud computing

Abstract: The popularity of mobile devices, especially intelligent mobile phones, significantly prompt various location-based services (LBSs) in cloud systems. These services not only greatly facilitate people's daily lives, but also cause serious threats that users' location information may be misused or leaked by service providers. The dummy-based privacy protection techniques have significant advantages over others because they neither rely on trusted servers nor need adequate number of trustworthy peers. Existing du… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 33 publications
(35 reference statements)
0
11
0
Order By: Relevance
“…Time consumption [21,55,22,24,63,26,27,29,31,66,33,34,67,68,37,7,38,39,40,41,42,57,71,58,59,75,44,47,48,49,51,88] Communication overhead [24,64,65,32,66,33,67,68,36,7,91,85,86,41,56,42,57,71,58,75,49,…”
Section: Resources Usage Metricsmentioning
confidence: 99%
“…Time consumption [21,55,22,24,63,26,27,29,31,66,33,34,67,68,37,7,38,39,40,41,42,57,71,58,59,75,44,47,48,49,51,88] Communication overhead [24,64,65,32,66,33,67,68,36,7,91,85,86,41,56,42,57,71,58,75,49,…”
Section: Resources Usage Metricsmentioning
confidence: 99%
“…In order to provide high-quality services, the cloud manager first customizes virtual machines (VMs) for vehicles to support LBS according to the vehicles' demands. 7 Moreover, a major concern that hinders IoV application is cost. The Lee and Lai 8 and Bayat et al 9 are currently a better solution to improve security and improve computational efficiency, but these schemes use bilinear pairing operations.…”
Section: Introductionmentioning
confidence: 99%
“…A large number of techniques [10][11][12][13][14][15][16][17][18][19][20][21][22] have been proposed to address the privacy preservation issue in location-based services. Some of them are based on the cloaking technique, which employs the k-anonymity model to protect user's location privacy.…”
Section: Introductionmentioning
confidence: 99%