2006
DOI: 10.1007/11957454_23
|View full text |Cite
|
Sign up to set email alerts
|

Preserving User Location Privacy in Mobile Data Management Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
229
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 271 publications
(229 citation statements)
references
References 16 publications
0
229
0
Order By: Relevance
“…Various models of privacy protection systems have been proposed to support privacy-preserving and efficient data communication between mobile clients and servers, including client/server models [4], trusted third party models [5,13,19] and distributed models [7,8]. While the client/server model is simpler to implement, due to the lack of global knowledge in client side, the protection cost is in general higher with lower protection quality.…”
Section: Related Workmentioning
confidence: 99%
“…Various models of privacy protection systems have been proposed to support privacy-preserving and efficient data communication between mobile clients and servers, including client/server models [4], trusted third party models [5,13,19] and distributed models [7,8]. While the client/server model is simpler to implement, due to the lack of global knowledge in client side, the protection cost is in general higher with lower protection quality.…”
Section: Related Workmentioning
confidence: 99%
“…The privacy is generally measured by K-anonymity [6,7] requirements. Two main approaches have been proposed for location anonymizing: centralized [8][9][10][11][12][13] and decentralized [14][15][16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…Location cloaking has been a popular approach for providing location privacy [5,9,10,16]. Here, an individual's device or a third party cloaks the individual's location before giving it to the provider of a locationbased service.…”
Section: Related Workmentioning
confidence: 99%
“…Here, an individual's device or a third party cloaks the individual's location before giving it to the provider of a locationbased service. Cheng et al [5] study location cloaking for a service that alerts people of nearby friends. For each individual, the service provider knows only that the individual is within a particular region, but not where exactly.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation