Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2019, Article ID 9297181, 11 pages
https://doi.org/10.1155/2019/9297181
Research Article

One More Accuracy k-Anonymity Framework for LBS

1School of Information Management, Shanxi University of Finance and Economics, Taiyuan 030006, China
2College of Computer Science, Taiyuan University of Technology, Taiyuan 030024, China

Correspondence should be addressed to Fang Zheng; moc.621@42301102ecila

Received 3 February 2019; Revised 8 July 2019; Accepted 1 September 2019; Published 29 September 2019

Academic Editor: Claudio Agostino Ardagna

Copyright © 2019 Fang Zheng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. Gedik and L. Liu, “Location privacy in mobile systems: a personalized anonymization model,” in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS’05), pp. 6–10, Columbus, OH, USA, June 2005. View at Publisher · View at Google Scholar
  2. B. R. Rohini and B. S. Babu, “Modeling k-anonymity framework for the proximity-based privacy protection in context-aware LBS,” Communications in Computer and Information Science, vol. 250, pp. 187–193, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. Z. H. Yang, L. I. Shan-Ping, and X. Lin, “Anonymity level adaptation algorithm to meet resource constraint of k-anonymity service in LBS,” Journal of Zhejiang University, vol. 45, no. 7, pp. 1154–1160, 2011. View at Google Scholar
  4. A. Masoumzadeh, J. Joshi, and H. A. Karimi, “LBS (k, T)-anonymity:a spatio-temporal approach to anonymity for location-based service users,” in Proceedings of the ACM Sigspatial International Conference on Advances in Geographic Information Systems, Seattle, Washington, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  5. M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference on Mobile Systems, Applications and Services—MobiSys, San Francisco, CA, USA, May 2003. View at Publisher · View at Google Scholar · View at Scopus
  6. P. Shanthi and S. R. Balasundaram, “An efficient clique cloak algorithm for defending location-dependent attacks in location based services,” in Proceedings of the 2014 International Conference, ACM, Udaipur, Rajasthan, November 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. M. F. Mokbel, C. Y. Chow, and W. G. Aref, “The new casper: query processing for location services without compromising privacy,” in Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763–774, Seoul, Korea, September 2006.
  8. M. F. Mokbel, C. Y. Chow, and W. G. Aref, “The new casper: a privacy-aware location-based database server,” in Proceedings of the IEEE International Conference on Data Engineering, IEEE, Istanbul, Turkey, April 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. B. Bamba, L. Liu, P. Pesti, and T. Wang, “Supporting anonymous location queries in mobile environments with privacygrid,” in Proceedings of the International Conference on World Wide Web, ACM, Beijing, China, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  10. R. Schlegel, C. Y. Chow, Q. Huang, and D. S. Wong, “User-defined privacy grid system for continuous location-based services,” IEEE Transactions on Mobile Computing, vol. 14, no. 10, pp. 2158–2172, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services,” in Proceedings of the International Conference on Pervasive Services, Santorini, Greece, July 2005. View at Publisher · View at Google Scholar · View at Scopus
  12. X. Liu, K. Liu, L. Guo, X. Li, and Y. Fang, “A game-theoretic approach for achieving k-anonymity in location based services,” in 2013 Proceedings of the IEEE INFOCOM, IEEE, Turin, Italy, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, “Achieving k-anonymity in privacy-aware location-based services,” in Proceedings of the IEEE INFOCOM, IEEE, Toronto, Canada, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  14. Z. Q. He and G. Chen, “Improvement of k-anonymity location privacy protection algorithm based on Hierarchy clustering,” Applied Mechanics and Materials, vol. 599–01, pp. 1553–1557, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. C. Ma, C. Zhou, and S. Yang, “A voronoi-based location privacy-preserving method for continuous query in LBS,” International Journal of Distributed Sensor Networks, vol. 11, no. 3, Article ID 326953, 2015. View at Publisher · View at Google Scholar · View at Scopus
  16. G. Sun, D. Liao, H. Li, H. Yu, and V. Chang, “L2P2: a location-label based approach for privacy preserving in LBS,” Future Generation Computer Systems, vol. 74, pp. 375–384, 2017. View at Publisher · View at Google Scholar · View at Scopus
  17. W. Zhen, “Research on optimization of top-k algorithm for continuous query of spatial objects in road network,” in Proceedings of the 2nd Information Technology and Mechatronics Engineering Conference, Chongqing, China, May 2016. View at Publisher · View at Google Scholar
  18. Q. Song and X. Wang, “Efficient routing on large road networks using hierarchical communities,” IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 1, pp. 132–140, 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. G. R. Jagadeesh, T. Srikanthan, and K. H. Quek, “Heuristic techniques for accelerating hierarchical routing on road networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 3, no. 4, pp. 301–309, 2002. View at Publisher · View at Google Scholar · View at Scopus
  20. J. Feng, Y. Zhu, N. Mukai, and T. Watanabe, “Integrated management of multi-level road network and transportation networks,” Lecture Notes in Computer Science, vol. 3683, pp. 677–683, 2005. View at Publisher · View at Google Scholar
  21. A. Shokoufandeh, D. Macrini, S. Dickinson, K. Siddiqi, and S. W. Zucker, “Indexing hierarchical structures using graph spectra,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 7, pp. 1125–1140, 2005. View at Publisher · View at Google Scholar · View at Scopus
  22. T. Brinkhoff, “A framework for generating network-based moving objects,” GeoInformatica, vol. 6, no. 2, pp. 153–180, 2002. View at Google Scholar
  23. M. Stonebraker, J. Frew, K. Gardels, and J. Meredith, “The sequoia 2000 storage benchmark,” ACM SIGMOD Record, vol. 22, no. 2, pp. 2–11, 1993. View at Publisher · View at Google Scholar · View at Scopus