2014 International Conference on Computing, Networking and Communications (ICNC) 2014
DOI: 10.1109/iccnc.2014.6785340
|View full text |Cite
|
Sign up to set email alerts
|

SocialCloaking: A distributed architecture for K-anonymity location privacy protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…For example, if a user is currently located at the NECTEC building, a larger fuzzy area name, such as Thailand Science Park or even the Khlong Luang District, can be employed as a cloaked region to disguise the user's location. An approach called k-anonymity [37][38][39][40][41][42][43] is used to blend the exact location of the user with other locations of users nearby that are impossible or difficult to distinguish. This approach uses a similar idea as spatial cloaking to blur the real location of the user but uses locations from a group of k users instead of a cloaked region.…”
Section: Monitoring and Trackingmentioning
confidence: 99%
“…For example, if a user is currently located at the NECTEC building, a larger fuzzy area name, such as Thailand Science Park or even the Khlong Luang District, can be employed as a cloaked region to disguise the user's location. An approach called k-anonymity [37][38][39][40][41][42][43] is used to blend the exact location of the user with other locations of users nearby that are impossible or difficult to distinguish. This approach uses a similar idea as spatial cloaking to blur the real location of the user but uses locations from a group of k users instead of a cloaked region.…”
Section: Monitoring and Trackingmentioning
confidence: 99%
“…To provide privacy protection under collusion attacks, Zhang et al designed a location privacy-preserving scheme, which for anonymity is achieved by integrating smart contract and Shamir encryption mechanism with collaborative users to improve privacy level [20]. To enhance the trustworthiness of anonymous users, Hwang and Huang [21] and Hwang et al [22] proposed a set of requesting users that can use social networks to select collaborative users and use their real locations to construct anonymity set by using their real location. Yang et al use a single-round sealed double auction mechanism to motivate users in the collaboration process to allow multiple requesting users to request users to obtain the real location of the collaborating users through the auction results and complete the anonymous location selection.…”
Section: Collaboration-based Methodmentioning
confidence: 99%
“…However, most of the existing k-anonymity-based location privacy protection methods depend on third-party servers, which are unreliable due to the performance and security bottlenecks of third-party servers, resulting in privacy vulnerabilities. To address this issue, a k-anonymity approach without the need for a trusted third party has been proposed [16][17][18][19][20][21][22][23]. In this method, the requesting user can negotiate directly with the surrounding collaborating users and protect their real location by generating an anonymity set that contains the collaborating anonymous location.…”
Section: Introductionmentioning
confidence: 99%