2014
DOI: 10.14257/ijsia.2014.8.1.13
|View full text |Cite
|
Sign up to set email alerts
|

Sensitive Semantics-Aware Personality Cloaking on Road-Network Environment

Abstract: Recently, several cloaking methods based on K-anonymity and L-diversity has been proposed to protect the user's location privacy for Location-based Services (LBS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 26 publications
(52 reference statements)
0
8
0
Order By: Relevance
“…In [ 20 ], the regional division is improved by adopting a multi-level grid model to divide position points at different speeds in the trajectory according to different granularity, so as to maintain the original sequence information of the trajectory to the maximum extent. However, these methods have the problem of low data availability due to excessive information loss rate, and fail to fully consider the semantic location information of users, resulting in semantic inference attacks [ 21 ], which leads to the disclosure of users’ sensitive privacy.…”
Section: Related Workmentioning
confidence: 99%
“…In [ 20 ], the regional division is improved by adopting a multi-level grid model to divide position points at different speeds in the trajectory according to different granularity, so as to maintain the original sequence information of the trajectory to the maximum extent. However, these methods have the problem of low data availability due to excessive information loss rate, and fail to fully consider the semantic location information of users, resulting in semantic inference attacks [ 21 ], which leads to the disclosure of users’ sensitive privacy.…”
Section: Related Workmentioning
confidence: 99%
“…In recent years, domestic and foreign researchers and institutions have widespread attention on location-based privacy preservation; increasingly in-depth studies are carried out in location-based privacy. Besides the above-described location privacy preserving technologies, there are a wealth of methods such as location data randomization [32], fuzzification of space or time data [33,34], methods based on strategies and encryption [35][36][37], and sensitive semantic based security anonymity mechanism [33,[38][39][40].…”
Section: Related Workmentioning
confidence: 99%
“…Spatial cloaking [17][18][19][20][21][22][23][24][25] is a fairly popular mechanism. Chow et al [17] propose Casper cloak algorithm, which uses a quad-tree data structure and allows users to determine the size of and the minimum anonymous area, but the privacy can be guaranteed only when users' positions are distributed evenly.…”
Section: Related Workmentioning
confidence: 99%
“…It is common to generate Security and Communication Networks add query count to Sets (6) end if (7) end for (8) e Sets are randomly divided into set 1 and set 2 equally (9) Do (10) akg 1 = average(set 1 ); akg 2 = average(set 2 ); (11) for in Sets (12) if (s − akg 1 ) 2 < (s − akg 2 ) 2 then (13) s belong to c 1 (14) else (15) s belong to c 2 (16) end if (17) end for (18) while there are changes on the elements in c 1 and c 2 (19) if the number of GID belongs to c 1 then (20) FCR isselected randomly from the regions with the number in c 1 except RCR (21) else FCR is selected randomly from the regions with the number in c 2 except RCR (22) dummy positions randomly in the double cloaking regions; however, we propose defining two rules to generate fixed dummy positions according to . In Figure 8, the red solid circle represents the user's real position and the solid circles represent the fixed dummy positions according to our rules, while the dotted circles represent the dummy positions generated randomly.…”
Section: Dummies Generation Algorithmmentioning
confidence: 99%