Efficient dummy generation for protecting location privacy in location based services |
Cai, Tian-yuan
(College of Information and Communication Engineering, Wonkwang University)
Youn, Ji-hye (College of Information and Communication Engineering, Wonkwang University) Song, Doo-hee (College of Information and Communication Engineering, Wonkwang University) Park, Kwang-jin (College of Information and Communication Engineering, Wonkwang University) |
1 | B. Niu, X. Zhu, X. Lei, et al., "EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs", IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 398-406, 2014. https://doi.org/10.1109/GLOCOM.2013.6831391 |
2 | H. Zhao, J. Wan, and Z. Chen. "A Novel Dummy-Based KNN Query Anonymization Method in Mobile Services", International Journal of Smart Home, vol. 10, no. 6, pp. 137-154, 2016. http://dl.acm.org/citation.cfm?id=2424354 |
3 | B. Niu, X. Zhu, X. Lei, et al., "Privacy-area aware dummy generation algorithms for location-based services", IEEE International Conference on Communications, pp. 957-962, 2014. https://doi.org/10.1109/ICC.2014.6883443 |
4 | B. Niu, S. Gao, F. Li, et al., "Protection of location privacy in continuous LBSs against adversaries with background information", IEEE International Conference on Computing, Networking and Communications, pp. 1-6, 2016. DOI : 10.1109/ICCNC.2016.7440649 |
5 | F. Li, S. Wan, B Niu, et al., "Time obfuscation-based privacy-preserving scheme for location-based services", Wireless Communications and Networking Conference, pp. 1-6, 2016. https://doi.org/10.1109/WCNC.2016.7564715 |
6 | B. Niu, Q. Li, X. Zhu, et al., "Enhancing privacy through caching in location-based services", IEEE International Conference on Computer Communications, pp. 1017-1025, 2015. https://doi.org/10.1109/INFOCOM.2015.7218474 |
7 | B. Niu, X. Zhu, W. Li, et al., "A personalized two-tier cloaking scheme for privacy-aware location-based services", IEEE Computing, Networking and Communications, pp. 94-98, 2015. https://doi.org/10.1109/ICCNC.2015.7069322 |
8 | K. G. Shin, X. Ju, Z. Chen, et al., "Privacy protection for users of location-based services", IEEE Wireless Communications, vol. 19, no. 1, pp. 30-39, 2012. https://doi.org/10.1109/MWC.2012.6155874 |
9 | A. R. Beresford and F. Stajano, "Location privacy in pervasive computing", IEEE Pervasive computing, vol. 2, no .1, pp. 46-55, 2003. https://doi.org/10.1109/MPRV.2003.1186725 DOI |
10 | Y. H. Gustav, X. Wu, Y. Ren, et al., "Dummy Based Privacy Preservation in Continuous Querying Road Network Services", IEEE International Conference Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 94-101, 2014. DOI : 10.1109/CyberC.2014.24 |
11 | P. R. Lei, W. C. Peng, I. J. Su, et al., "Dummy-based schemes for protecting movement trajectories", Journal of Information Science and Engineering, vol. 28, no. 2, pp. 335-350, 2012. DOI : https://ir.nctu.edu.tw/handle/11536/15826 |
12 | B. Niu, Q. Li, X. Zhu, et al. "Achieving k-anonymity in privacy-aware location-based services", IEEE International Conference on Computing, Networking and Communications, pp. 754-762, 2014. https://doi.org/10.1109/INFOCOM.2014.6848002 |
13 | T. Y. Cai, D. H. Song, et al., "Efficient dummy generation for protecting location privacy", korea Institute of information, Electronics and Communication Technology, vol. 9, no. 6, pp.526-533, 2016. http://dx.doi.org/10.17661/jkiiect.2016.9.6.526 DOI |
14 | T. Hara, A. Suzuki, M. Iwata, et al. "Dummy-Based User Location Anonymization Under Real-World Constraints", IEEE Access, vol. 4, pp. 673-687, 2016. https://doi.org/10.1109/ACCESS.2016.2526060 DOI |
15 | B. Niu, X. Zhu, H. Chi, et al. "3PLUS: Privacypreserving pseudo-location updating system in locationbased services", IEEE Wireless Communications and Networking Conference, pp. 4564-4569, 2013. https://doi.org/10.1109/CC.2013.6623499 |
16 | H. Kido, Y. Yanagisawa, and T. Satoh, "An anonymous communication technique using dummies for location-based services", Proceedings. International Conference on Pervasive Services, pp. 88-97, 2005. http://ieeexplore.ieee.org/document/1506394/tp=&arnu mber=1506394 |
17 | M. F. Mokbel, C. Y. Chow, and W . G. Aref, "The new Casper: query processing for location services without compromising privacy", Proceedings of the 32nd international conference on Very large data bases, pp. 763-774, 2006. DOI : https://www.cerias.purdue.edu/apps/reports_and _papers/view/3799 |
18 | B. Niu, X. Zhu, X. Lei, et al., "Eps: Encounter-based privacy-preserving scheme for location-based services", IEEE Global Communications Conference, pp. 2139-2144, 2013. https://doi.org/10.1109/GLOCOM.2013.6831391 |
19 | D. H. Song, J. Sim, K. J. Park, et al., "A privacypreserving continuous location monitoring system for location-based services", International Journal of Distributed Sensor Networks, pp.1-10, 2015. http://journals.sagepub.com/doi/full/10.1155/2015/815613 |
20 | T. Xu and Y. Cai, "Exploring historical location data for anonymity preservation in location-based services", IEEE International Conference on Computer Communications, pp. 1220-1228, 2008. https://doi.org/10.1109/INFOCOM.2008.103 |