Hashem et al., 2013 - Google Patents
Protecting privacy for group nearest neighbor queries with crowdsourced data and computingHashem et al., 2013
- Document ID
- 6972659808686152792
- Author
- Hashem T
- Ali M
- Kulik L
- Tanin E
- Quattrone A
- Publication year
- Publication venue
- Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
External Links
Snippet
User privacy in location-based services (LBSs) has become an important research area. We introduce a new direction to protect user privacy that evaluates LBSs with crowdsourced data and computation and eliminates the role of a location-based service provider. We focus …
- 239000003999 initiator 0 description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
- H04W4/025—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using location based information parameters
- H04W4/028—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using location based information parameters using historical or predicted position information, e.g. trajectory data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30522—Query processing with adaptation to user needs
- G06F17/30528—Query processing with adaptation to user needs using context
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/3087—Spatially dependent indexing and retrieval, e.g. location dependent results to queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wernke et al. | A classification of location privacy attacks and approaches | |
Memon et al. | Dynamic path privacy protection framework for continuous query service over road networks | |
Hashem et al. | Protecting privacy for group nearest neighbor queries with crowdsourced data and computing | |
Alrahhal et al. | AES-route server model for location based services in road networks | |
CN108600304A (en) | A kind of personalized location method for secret protection based on position k- anonymities | |
Bettini | Privacy protection in location-based services: a survey | |
Hayashida et al. | Dummy generation based on user-movement estimation for location privacy protection | |
Guo et al. | Secure and efficient ${K} $ nearest neighbor query over encrypted uncertain data in cloud-IoT ecosystem | |
Nisha et al. | A novel privacy protection scheme for location-based services using collaborative caching | |
Ashraf et al. | State-of-the-art Challenges: Privacy Provisioning in TPP Location Based Services Systems | |
Zhang et al. | Privacy quantification model based on the Bayes conditional risk in Location-based services | |
Ardagna et al. | Landscape-aware location-privacy protection in location-based services | |
Zhao et al. | A novel dummy-based KNN query anonymization method in mobile services | |
Yang et al. | Participant selection strategy with privacy protection for internet of things search | |
KR20140028935A (en) | K-nearest neighbour query processing method and system | |
CN109858279B (en) | K nearest neighbor query method based on trust incentive and position privacy protection | |
Wang et al. | Privacy preserving for continuous query in location based services | |
Jia et al. | Nonexposure Accurate Location K‐Anonymity Algorithm in LBS | |
Aloui et al. | An efficient approach for privacy-preserving of the client’s location and query in m-business supplying lbs services | |
Ali et al. | Protecting Privacy for Group Nearest Neighbor Queries with Crowdsourced Data and Computing | |
Cuellar et al. | Indistinguishable regions in geographic privacy | |
Riboni et al. | Integrating identity, location, and absence privacy in context-aware retrieval of points of interest | |
Hashem et al. | Protecting privacy for distance and rank based group nearest neighbor queries | |
Zhang et al. | A caching-based privacy-preserving scheme for continuous location-based services | |
Khan et al. | Location oblivious privacy protection for group nearest neighbor queries |