2010 18th International Conference on Geoinformatics 2010
DOI: 10.1109/geoinformatics.2010.5568118
|View full text |Cite
|
Sign up to set email alerts
|

The location privacy protection research in location-based service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…They have revolutionized navigation (on land, in the air and at sea) and intelligent transportation system by increasing their safety and efficiency. However, user location privacy security poses a potentially grave threat [1]. In fact, it is possible to access user location information anytime and anywhere.…”
Section: Location Based Servicesmentioning
confidence: 99%
See 1 more Smart Citation
“…They have revolutionized navigation (on land, in the air and at sea) and intelligent transportation system by increasing their safety and efficiency. However, user location privacy security poses a potentially grave threat [1]. In fact, it is possible to access user location information anytime and anywhere.…”
Section: Location Based Servicesmentioning
confidence: 99%
“…The large diversification of existing wireless Radio Access Technologies (RAT) and the increasing number of wirelessenabled devices are promoting the extensive application of Location Based Services (LBS) [1]. Position-dependant services include: emergency services such as rescue response [2] and security alerts, entertainment services like mobile gaming [3], medical applications [4] and a wide variety of other applications.…”
Section: Introductionmentioning
confidence: 99%
“…These works aim to ensure that users could enjoy the location service and make attackers unable to obtain accurate position information. The main methods include K-anonymous methods, differential privacy protection methods, path obfuscation and random encryption [ 9 ]. As a traditional method, the K-anonymity method uses a position set to replace the user position, and the set contains the real user position and other fake K-1 positions.…”
Section: Related Workmentioning
confidence: 99%
“…For example, a discussion of research regarding location privacy in LBSs and a method to keep the user's location private can be found in [13] and [14], respectively. To perform a service, the user must send his or her current location (obtained by using a GPS locator, for instance) to a service provider, which processes the request and then sends back an appropriate result, satisfying the given location.…”
Section: Overview Of Security and Privacy In C-lbsmentioning
confidence: 99%