A Framework for Generating Network-Based Moving Objects
Geoinformatica
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
A generic framework for monitoring continuous spatial queries over moving objects
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
An efficient and scalable approach to CNN queries in a road network
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Continuous nearest neighbor monitoring in road networks
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Query processing in spatial network databases
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Voronoi-based K nearest neighbor search for spatial network databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
SUTC '08 Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008)
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Snapshot location-based query processing on moving objects in road networks
Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems
PROS: a peer-to-peer system for location privacy protection on road networks
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Anonymous Query Processing in Road Networks
IEEE Transactions on Knowledge and Data Engineering
Privacy-aware mobile services over road networks
Proceedings of the VLDB Endowment
Privacy preserving group nearest neighbor queries
Proceedings of the 13th International Conference on Extending Database Technology
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
Preface of special issue: advanced topics on wireless sensor networks
Concurrency and Computation: Practice & Experience
Hi-index | 0.00 |
Location-based services (LBSs) are currently some of the fastest growing information technology industries. User privacy in LBSs has attracted great interest in the research community. However, the proliferation of position identifying devices has become an increasing privacy threat for users in LBSs. It is very difficult to avoid the privacy threat of a user in processing his/her request because the user has to submit his/her exact location with a query to the LBS. To protect privacy in road networks, the existing method employs an X-Star framework to hide the query issuer and provide protection from attack resilience. However, it incurs low anonymization success rate and high computation cost. To solve the problems, we propose a Hilbert-order-based star network expansion cloaking algorithm (H-Star). Our H-Star guarantees k-anonymity under the strict reciprocity condition and increases anonymization success rate by reducing computation overhead. We also propose k-nearest neighbor and range query processing algorithms based on the anonymized region. Through comprehensive experimental analysis, we show the effectiveness of our algorithms in the field of spatial cloaking.Copyright © 2012 John Wiley & Sons, Ltd.