2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2017
DOI: 10.1109/icacci.2017.8125831
|View full text |Cite
|
Sign up to set email alerts
|

Real time implementation of k fake location generation algorithm to protect location privacy in location based services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…They concentrated on the mobility similarity metric and ensured the tradeoff between location privacy and utility. Kini et al [21] considered a k-anonymity-based location generation algorithm that takes into account the data characteristics in real world and implemented the algorithm in realistic mobility scenarios, but the authors studied the complexity and communication overhead of the algorithm without discussing the effect of privacy protection. Peng et al [22] proposed an enhanced location privacy preserving (ELPP) scheme that doesn't require fully trusted entity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They concentrated on the mobility similarity metric and ensured the tradeoff between location privacy and utility. Kini et al [21] considered a k-anonymity-based location generation algorithm that takes into account the data characteristics in real world and implemented the algorithm in realistic mobility scenarios, but the authors studied the complexity and communication overhead of the algorithm without discussing the effect of privacy protection. Peng et al [22] proposed an enhanced location privacy preserving (ELPP) scheme that doesn't require fully trusted entity.…”
Section: Related Workmentioning
confidence: 99%
“…In the past few years, many protection schemes have been proposed to protect the trajectories for continuous LBS or the trajectory publication [14][15][16][17][18][19][20][21][22][23][24][25][26][27]. The data of a trajectory is composed of a location dataset which includes a series of locations in chronological order, thus, the trajectory protection means protecting the chronological location data.…”
Section: Introductionmentioning
confidence: 99%
“…About the location of devices, article [16] has implemented a real-time model to protect the location privacy of the user by considering characteristics of the real world. The aim of article [17] is to acknowledge the combined power of big data, position, motion sensors present in an everyday mobile phone while defocusing the use of GPS and lessening the privacy concern.…”
Section: Related Workmentioning
confidence: 99%