2013
DOI: 10.1007/978-3-642-36818-9_11
|View full text |Cite
|
Sign up to set email alerts
|

On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor Queries

Abstract: Abstract. The development of location-based services has brought not only conveniences to users' daily life but also great concerns about users' location privacy. Thus, privacy aware query processing that handles cloaked regions has become an important part in preserving user privacy. However, the state-of-theart private query processors only focus on handling rectangular cloaked regions, while lacking an efficient and scalable algorithm for other complicated cloaked region shapes, such as polygon and circle. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 15 publications
(26 reference statements)
0
4
0
Order By: Relevance
“…Although the adversary does not infer the actual location in general, the location information will be leaked if k users' locations were in the same place or in a sensitive region, and it brings heavy communication overhead to user. Cloaking technique are extensively used to prevent the disclosure of user's data through blurring the user location into a cloaked spatial regions [16], [17], [31]. Mokbel et al [16] presented a framework in which user can entertain locationbased services without revealing their location information by blurring users' exact location into cloaked area.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although the adversary does not infer the actual location in general, the location information will be leaked if k users' locations were in the same place or in a sensitive region, and it brings heavy communication overhead to user. Cloaking technique are extensively used to prevent the disclosure of user's data through blurring the user location into a cloaked spatial regions [16], [17], [31]. Mokbel et al [16] presented a framework in which user can entertain locationbased services without revealing their location information by blurring users' exact location into cloaked area.…”
Section: Related Workmentioning
confidence: 99%
“…Different form [16] only focus on handling rectangular cloaked regions, Liu et al [17] proposed a new convex hull of polygon (CHP) algorithm for nearest-neighbor queries using a polygon cloaked area. Ngo et al [31] introduced a new location privacy aware nearest-neighbor query processor that provides efficient processing of complicated polygonal and circular cloaked regions, by proposing the Vertices Reduction Paradigm and the Group Execution Agent. However, instead of returning an exact answers to the user, the above privacy framework using cloaking technique returns a list of candidate answers according to the cloaked users or cloaked area which brings heavy communication overhead to user side.…”
Section: Related Workmentioning
confidence: 99%
“…Besides, it can be interacted with the LBS middleware in [16] and queries processing techniques in [15] to operate completely.…”
Section: Simple Scenariomentioning
confidence: 99%
“…The crucial objective is to hide the users' personal information but still allow them to use services with acceptable quality. The main idea of these solutions is to obfuscate users' location [2,12], or to anonymize location information [3,13,14,15]. Of those solutions, there are three limitations.…”
Section: Introductionmentioning
confidence: 99%