A Novel Method for Location Privacy Protection in LBS Applications

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Location cloaking for location privacy protection and location safety protection

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi CHAPTER

متن کامل

Location Depersonalization for Location Privacy Protection in Location-Based Services

A spatial region with K different footprints indicates that it has been visited by K different people. An adversary may be able to identify all these users, but will not know who was there at what time. This observation gives us a new direction to investigate location depersonalization in location-based services (LBSs). We propose to leverage users’ historical location samples, each being a foo...

متن کامل

User Privacy Protection from Trajectory Perspective in Location-based Applications

Under the help of information and communication technologies, our lives are becoming better than ever in such a way we have been spending. One of popular and worthy supports comes from mobile devices. Integrated with modern positioning-aware technologies like Assisted Global Positioning System (A-GPS), mobile devices nowadays can locate users’ position with acceptable accuracy. However, privacy...

متن کامل

Wireless Location Privacy Protection

A fter more than two decades of hype, computing and communication technologies are finally converging. Java-enabled cell phones run a host of powerful applications including mobile Internet access, while many notebook computers offer high-speed wireless connectivity as a standard feature. The big decision when purchasing a PDA this holiday season is whether to get integrated cellular service or...

متن کامل

Location privacy protection algorithm for mobile networks

Mobile users often post nearest neighbor queries based on their current location. Usually, the mobile terminal (user) sends a request to query an untrusted location server, including the position information of the mobile terminal requests, thus leading to the disclosure of one’s location. For mobile users providing location services, the privacy of mobile users is crucial. This demand is parti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2019

ISSN: 1939-0114,1939-0122

DOI: 10.1155/2019/1914038