Location recommendation privacy protection method based on location sensitivity division

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Location Depersonalization for Location Privacy Protection in Location-Based Services

A spatial region with K different footprints indicates that it has been visited by K different people. An adversary may be able to identify all these users, but will not know who was there at what time. This observation gives us a new direction to investigate location depersonalization in location-based services (LBSs). We propose to leverage users’ historical location samples, each being a foo...

متن کامل

Location cloaking for location privacy protection and location safety protection

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi CHAPTER

متن کامل

Location Diversity: Enhanced Privacy Protection in Location Based Services

Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding the association of a specific query with a specific user. Unfortunately, this approach fails in many practical cases such as: (i) personalized services, where the user identity is required, or (ii) applications involving groups ...

متن کامل

Thwarting location privacy protection in location-based social discovery services

Location-based social discovery (LBSD) services enable users to discover their geographic neighborhoods to make new friends. Original LBSD services were designed to provide the exact distances to nearby users. It has been shown that it is easy to pinpoint any target user’s location by using trilateration based on the exact distances from three fake Global Positioning System locations to the tar...

متن کامل

Wireless Location Privacy Protection

A fter more than two decades of hype, computing and communication technologies are finally converging. Java-enabled cell phones run a host of powerful applications including mobile Internet access, while many notebook computers offer high-speed wireless connectivity as a standard feature. The big decision when purchasing a PDA this holiday season is whether to get integrated cellular service or...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EURASIP Journal on Wireless Communications and Networking

سال: 2019

ISSN: 1687-1499

DOI: 10.1186/s13638-019-1606-y