Computational geometry: algorithms and applications
Computational geometry: algorithms and applications
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Wireless Location Privacy Protection
Computer
IEEE Transactions on Knowledge and Data Engineering
Towards Privacy-Aware Location-Based Database Servers
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Toward a distributed k-anonymity protocol for location privacy
Proceedings of the 7th ACM workshop on Privacy in the electronic society
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems
COMPSAC '09 Proceedings of the 2009 33rd Annual IEEE International Computer Software and Applications Conference - Volume 01
Safeguarding location privacy in wireless ad-hoc networks
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services
IEEE Transactions on Parallel and Distributed Systems
A user location anonymization method for location based services in a real environment
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
MobiMix: Protecting location privacy with mix-zones over road networks
ICDE '11 Proceedings of the 2011 IEEE 27th International Conference on Data Engineering
Spatial Cloaking Method Based on Reciprocity Property for Users' Privacy in Road Networks
CIT '11 Proceedings of the 2011 IEEE 11th International Conference on Computer and Information Technology
Privacy protection in location-based services through a public-key privacy homomorphism
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |
The explosive growth of location-detection devices, such as GPS (Global Positioning System), continuously increases users' privacy threat in location-based services (LBSs). However, in order to enjoy such services, the user must precisely disclose his/her exact location to the LBS. So, it is a key challenge to efficiently preserve user's privacy while accessing LBS. For this, the existing method employs a 2PASS cloaking scheme hides the actual user location and reduces bandwidth consumption. However, it suffers from privacy attack since the 2PASS does not actually consider user distribution in the cloaking area.. Therefore, it is required to preserve user privacy by utilizing k-anonymity property. So, we, in this paper, propose a weighted adjacency graph based k-anonymous cloaking technique that can ensure users privacy protection and also reduce bandwidth usages. Our cloaking approach efficiently supports k-nearest neighbor queries without revealing the private information of the query initiator. We demonstrate via experimental results that our algorithm yields much better performance than the existing one.