2021
DOI: 10.1002/cpe.6760
|View full text |Cite
|
Sign up to set email alerts
|

k‐anonymity based location privacy protection method for location‐based services in Internet of Thing

Abstract: The wide application of Internet of Things technology has promoted the application of location‐based services (LBS). Users can enjoy various conveniences brought by LBS. However, mobile users should submit their location information to LBS which may lead to privacy disclosure. Therefore, users need to protect their privacy while enjoying the service. If the privacy protection problem cannot be solved, the development of mobile internet business will be greatly affected. The existing location privacy protection… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 18 publications
0
1
0
Order By: Relevance
“…Despite these challenges, TCP location-based services represent a crucial intersection of network technology and geographic information systems, offering significant benefits for both users and providers by delivering more personalized and location-aware online experiences. Studies have examined approaches like kanonymity spatial cloaking, and privacy-preserving location-based services to safeguard users' location privacy while still enabling the benefits of location-based applications [58], [59].…”
Section: Privacy Issuesmentioning
confidence: 99%
“…Despite these challenges, TCP location-based services represent a crucial intersection of network technology and geographic information systems, offering significant benefits for both users and providers by delivering more personalized and location-aware online experiences. Studies have examined approaches like kanonymity spatial cloaking, and privacy-preserving location-based services to safeguard users' location privacy while still enabling the benefits of location-based applications [58], [59].…”
Section: Privacy Issuesmentioning
confidence: 99%
“…To verify this problem, Tu et al [17]proposed a privacy preserving scheme to prevent semantic and re-identification attacks by employing three data masking methods: k-anonymity, l diversity and tcloseness. Wang et al [21] proposed a location privacy preservation method based on k-anonymity and Voronoi maps, which ensures the privacy of location information while guaranteeing the security of the process and highquality service.…”
Section: Location Privacymentioning
confidence: 99%