计算机与控制工程 |
|
|
|
|
面向连续位置服务的位置感知隐私保护方案 |
郑磊( ),张俊星*( ) |
内蒙古大学 计算机学院,内蒙古 呼和浩特 010021 |
|
Location-aware privacy protection scheme in continuous location-based service |
Lei ZHENG( ),Jun-xing ZHANG*( ) |
College of Computer Science, Inner Mongolia University, Hohhot 010021, China |
1 |
LUO E, BHUIYAN M Z A, WANG G, et al Privacy protector: privacy-protected patient data collection in IoT-based healthcare systems[J]. IEEE Communications Magazine, 2018, 56 (2): 163- 168
doi: 10.1109/MCOM.2018.1700364
|
2 |
LIU Q, WANG G, LI F, et al Preserving privacy with probabilistic indistinguishability in weighted social networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2017, 28 (5): 1417- 1429
doi: 10.1109/TPDS.2016.2615020
|
3 |
LI L, LU R, HUANG C EPLQ: efficient privacy-preserving location-based query over outsourced encrypted data[J]. IEEE Internet of Things Journal, 2016, 3 (2): 206- 218
doi: 10.1109/JIOT.2015.2469605
|
4 |
AMAGATA D, HARA T A general framework for MaxRS and MaxCRS monitoring in spatial data streams[J]. ACM Transactions on Spatial Algorithms and Systems, 2017, 3 (1): 1- 34
|
5 |
JUNGGAB S, DONGHYUN K, ALAM B M Z, et al Privacy enhanced location sharing for mobile online social networks[J]. IEEE Transactions on Sustainable Computing, 2018, 5 (2): 279- 290
|
6 |
NIU B, GAO S, LI F, et al. Protection of location privacy in continuous LBSs against adversaries with background information [C]// ICNC. Kauai: IEEE, 2016: 1-6.
|
7 |
LIU H, LI X, LI H, et al. Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services [C]// INFOCOM. Atlanta: IEEE, 2017: 1-9.
|
8 |
SCHLEGEL R, CHOW C Y, HUANG Q, et al User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing, 2015, 14 (10): 2158- 2172
|
9 |
ZHU X, CHI H, NIU B, et al. MobiCache: when k-anonymity meets cache [C]// Globecom. Atlanta: IEEE, 2013: 820-825.
|
10 |
REZA S, GEORGE T, PANOS P Hiding in the mobile crowd: locationprivacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014, 11 (3): 266- 279
doi: 10.1109/TDSC.2013.57
|
11 |
ZHANG S, LIU Q, WANG G. A caching-based privacy-preserving scheme for continuous location-based services [C]//SpaCCS. Zhangjiajie: Springer, 2016: 73-82.
|
12 |
PINGLEY A, ZHANG N, FU X, et al. Protection of query privacy for continuous location based services [C]// INFOCOM. Shanghai: IEEE, 2011: 1710-1718.
|
13 |
LIAO D, SUN G, LI H, et al The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems[J]. Cluster Computing, 2017, 20 (2): 1- 15
|
14 |
WANG X, PANDE A, ZHU J, et al STAMP: enabling privacy-preserving location proofs for mobile users[J]. IEEE/ACM Transactions on Networking, 2016, 24 (6): 3276- 3289
doi: 10.1109/TNET.2016.2515119
|
15 |
胡德敏, 郑霞 基于Space Twist的k-匿名增量近邻查询位置隐私保护算法[J]. 计算机应用研究, 2016, (8): 2402- 2404 HU De-min, ZHENG Xia Space twist-based k-anonymity incremental nearest neighbor query algorithm for location privacy protection[J]. Application Research of Computers, 2016, (8): 2402- 2404
doi: 10.3969/j.issn.1001-3695.2016.08.035
|
16 |
HWANG R H, HSUEH Y L, WU J J, et al SocialHide: a generic distributed framework for location privacy protection[J]. Journal of Network and Computer Applications, 2016, 76 (9): 87- 100
|
17 |
NIU B, ZHU X, LI W, et al. EPcloak: an efficient and privacy-preserving spatial cloaking scheme for LBSs [C]// IEEE International Conference on Mobile Ad Hoc and Sensor Systems. Philadelphia: IEEE, 2014: 398-406.
|
18 |
ZHANG S, WANG G, LIU Q, et al. A trajectory privacy-preserving scheme based on dual-K mechanism for continuous location-based services [C]// IEEE ISPA / IUCC. Guangzhou: IEEE, 2017: 406-419.
|
19 |
SHUHEI H, DAICHI A, TAKAHIRO H, et al Dummy generation based on user-movement estimation for location privacy protection[J]. IEEE Access, 2018, 6: 22958- 22969
doi: 10.1109/ACCESS.2018.2829898
|
20 |
GONG X, CHEN X, XING K, et al. Personalized location privacy in mobile networks: a social group utility approach [C]// INFOCOM. Hong Kong: IEEE, 2015: 1008-1016.
|
21 |
NATESAN G, LIU J. An adaptive learning model for k-anonymity location privacy protection [C]// COMPSAC. Taichung: IEEE, 2015: 10-16.
|
22 |
HWANG R H, HSUEH Y L, CHUNG H W A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014, 7 (2): 126- 139
doi: 10.1109/TSC.2013.55
|
23 |
ZHANG S, WANG G, LIU Q, et al A trajectory privacy-preserving scheme based on query exchange in mobile social networks[J]. Soft Computing, 2017, 22 (18): 6121- 6133
|
24 |
JUNG K, JO S, SEOG P. A game theoretic approach for collaborative caching techniques in privacy preserving location-based services [C]// BIGCOMP. Jeju: IEEE, 2015: 59–62.
|
25 |
PENG T, LIU Q, MENG D, et al Collaborative trajectory privacy preserving scheme in location-based services[J]. Information Sciences, 2017, 387: 165- 179
doi: 10.1016/j.ins.2016.08.010
|
26 |
ZHANG S, CHOO K K R, LIU Q, et al Enhancing privacy through uniform grid and caching in location-based services[J]. Future Generation Computer Systems, 2017, 86 (9): 881- 892
|
27 |
NIU B, LI Q, ZHU X, et al. Enhancing privacy through caching in location-based services [C]// INFOCOM. Hong Kong: IEEE, 2015: 1017-1025.
|
28 |
李璐璐, 华佳烽, 万盛, 等 基于高效信息缓存的位置隐私保护方案[J]. 通信学报, 2017, 38 (6): 148- 157 LI Lu-lu, HUA Jia-feng, WAN Sheng, et al Achieving efficient location privacy protection based on cache[J]. Journal on Communications, 2017, 38 (6): 148- 157
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|