2013
DOI: 10.1007/978-3-642-36818-9_12
|View full text |Cite
|
Sign up to set email alerts
|

Semantic-Aware Obfuscation for Location Privacy at Database Level

Abstract: Part 1: Information and Communication Technology- Eurasia Conference (ICT-EurAsia)International audienceAlthough many techniques have been proposed to deal with location privacy problem, which is one of popular research issues in location based services, some limitations still remain and hence they cannot be applied to the real world. One of the most typical proposed techniques is obfuscation that preserves location privacy by degrading the quality of user’s location information. But the less exact information… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 17 publications
(36 reference statements)
0
7
0
Order By: Relevance
“…With the new Query Processor's Vertices Reduction Paradigm and its tuning parameter ε, complicated polygonal [12][13][14][15] and circular [6] cloaked regions are handled efficiently. The main idea is that we employ the Ramer-Douglas-Peucker algorithm to simplify the region's polygon before processing it.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…With the new Query Processor's Vertices Reduction Paradigm and its tuning parameter ε, complicated polygonal [12][13][14][15] and circular [6] cloaked regions are handled efficiently. The main idea is that we employ the Ramer-Douglas-Peucker algorithm to simplify the region's polygon before processing it.…”
Section: Discussionmentioning
confidence: 99%
“…It acts as a middle layer between the user and the LBS Provider to reduce the location information quality in the LBS request. The quality reduction is performed by the obfuscation algorithm which transforms the location to be more general (i.e., from a point to a set of points [9], a rectilinear region [10][11][12][13][14][15], or a circular region [6], etc.). The request is then sent to the LBS Provider to process without the provider knowing the user's exact location.…”
Section: Introductionmentioning
confidence: 99%
“…In anonymous LBS (e.g., navigation), this category of algorithms aims for the protection of identity privacy. -Obfuscation: to make user location imprecise or inaccurate or generalize the location into a region [8], [4], [3], [6], [14], [15]. Generally, this process is done by the means of perturbation, adding dummies, reducing precision or location hiding.…”
Section: Related Work a Location Privacy Preservationmentioning
confidence: 99%
“…It acts as a middle layer between the user and the LBS Provider to reduce the location information quality in the LBS request. The quality reduction is performed by the obfuscation algorithm which transforms the exact location to be more general (i.e., from a point to a set of points [3], a rectilinear region [4], [5], [6], [7], or a circular region [8], [9], etc.). The request is then sent to the LBS Provider to process without the provider knowing the user's exact location.…”
Section: Introductionmentioning
confidence: 99%
“…The key idea of these methods is to avoid direct requests to the server of LBS from real request locations. Broadly speaking, existing works of location privacy-preserving can be classified into three categories: offset method [5]- [7], dummy method [2], [3], [8]- [11] and spatial cloaking method [4], [12]- [15]. The offset method is easy to implement but has poor availability.…”
Section: Introductionmentioning
confidence: 99%