Protection of location privacy for moving kNN queries in social networks

作者: Tinghuai Ma , Jing Jia , Yu Xue , Yuan Tian , Abdullah Al-Dhelaan

DOI: 10.1016/J.ASOC.2017.08.027

关键词:

摘要: … of their location privacy. An effective way to protect the user's location privacy is using an … for the server to process a kNN query while protecting user's location against the attack. …

参考文章(33)
Ali Khoshgozaran, Cyrus Shahabi, Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy symposium on large spatial databases. pp. 239- 257 ,(2007) , 10.1007/978-3-540-73540-3_14
Yinghua Lv, Tinghuai Ma, Meili Tang, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan, An efficient and scalable density-based clustering algorithm for datasets with complex structures Neurocomputing. ,vol. 171, pp. 9- 22 ,(2016) , 10.1016/J.NEUCOM.2015.05.109
Tinghuai Ma, Huan Rong, Changhong Ying, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan, Detect structural-connected communities based on BSCHEF in C-DBLP Concurrency and Computation: Practice and Experience. ,vol. 28, pp. 311- 330 ,(2016) , 10.1002/CPE.3437
Reynold Cheng, Yu Zhang, Elisa Bertino, Sunil Prabhakar, Preserving user location privacy in mobile data management infrastructures privacy enhancing technologies. pp. 393- 412 ,(2006) , 10.1007/11957454_23
Kavitha S, Yamini S, Raja Vadhana P, An evaluation on big data generalization using k-Anonymity algorithm on cloud ieee international conference on intelligent systems and control. pp. 1- 5 ,(2015) , 10.1109/ISCO.2015.7282237
H. Kido, Y. Yanagisawa, T. Satoh, An anonymous communication technique using dummies for location-based services international conference on pervasive services. pp. 88- 97 ,(2005) , 10.1109/PERSER.2005.1506394
Gísli R. Hjaltason, Hanan Samet, Ranking in Spatial Databases SSD '95 Proceedings of the 4th International Symposium on Advances in Spatial Databases. pp. 83- 95 ,(1995) , 10.1007/3-540-60159-7_6
Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino, Preventing velocity-based linkage attacks in location-aware applications advances in geographic information systems. pp. 246- 255 ,(2009) , 10.1145/1653771.1653807
Rui Zhang, Jianzhong Qi, Dan Lin, Wei Wang, Raymond Chi-Wing Wong, A highly optimized algorithm for continuous intersection join queries over moving objects very large data bases. ,vol. 21, pp. 561- 586 ,(2012) , 10.1007/S00778-011-0259-1
Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N. Rothblum, Differential privacy under continual observation Proceedings of the 42nd ACM symposium on Theory of computing - STOC '10. pp. 715- 724 ,(2010) , 10.1145/1806689.1806787