IEEE INFOCOM 2017 - IEEE Conference on Computer Communications 2017
DOI: 10.1109/infocom.2017.8056978
|View full text |Cite
|
Sign up to set email alerts
|

Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
57
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 84 publications
(58 citation statements)
references
References 24 publications
0
57
0
Order By: Relevance
“…In [19], the authors first proposed a technique of randomly generating dummies to complete anonymity, but the generated dummies have weak authenticity and can be easily identified. The methods in [20][21][22][23][24][25] study how to generate more realistic dummy trajectories. In [20], the authors presented trajectory k-anonymity, using the users' historical trajectory data to generate k − 1 dummy trajectories.…”
Section: Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…In [19], the authors first proposed a technique of randomly generating dummies to complete anonymity, but the generated dummies have weak authenticity and can be easily identified. The methods in [20][21][22][23][24][25] study how to generate more realistic dummy trajectories. In [20], the authors presented trajectory k-anonymity, using the users' historical trajectory data to generate k − 1 dummy trajectories.…”
Section: Scenariomentioning
confidence: 99%
“…An effective approach is to maintain the quality of service while ensuring that users' privacy is not leaked. Considering that the dummy techniques [13,[17][18][19][20][21][22][23][24][25][26][27] to protect the privacy of a user are to add dummy queries to the real query and do not reduce the quality of the service. They are feasible in our work.…”
Section: Introductionmentioning
confidence: 99%
“…In [22], the techniques can be classified as spatial anonymization, obfuscation, and private retrieval methods. Another classification is proposed in [23], where the different methods are categorized as dummy-based, K-anonymity, differential privacy, and cryptography. Unlike the previous classifications, we present the related work according to performance for a single user and a batch of users.…”
Section: Related Workmentioning
confidence: 99%
“…To protect users' location privacy during usage of location based services (LBS), various location privacy protection mechanisms have been proposed. Based on their core ideas, these mechanisms can be broadly categorized into approaches that use dummies [29,32], space transformation [18,28], mix-zone [6,36], encryption [31], spatial cloaking [5,10,17,20,21,27,30,34,40,43] and differential privacy [3,22,42]. The basic ideas behind these techniques are briefly discussed as follows.…”
Section: Related Workmentioning
confidence: 99%