Um et al., 2010 - Google Patents
An advanced cloaking algorithm using Hilbert curves for anonymous location based serviceUm et al., 2010
- Document ID
- 7245911626395102680
- Author
- Um J
- Kim H
- Chang J
- Publication year
- Publication venue
- 2010 IEEE second international conference on social computing
External Links
Snippet
Location Based Services (LBSs) have recently attracted much attention due to the advancement of GPS facilitates. In LBS, the private and confidential information of user may disclose to others since LBS need a user's location. To protect the privacy of users, many …
- 238000003780 insertion 0 description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30533—Other types of queries
- G06F17/30545—Distributed queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30312—Storage and indexing structures; Management thereof
- G06F17/30321—Indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
- G06F17/30477—Query execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30241—Information retrieval; Database structures therefor; File system structures therefor in geographical information databases
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ghinita et al. | PRIVE: anonymous location-based queries in distributed mobile systems | |
Talukder et al. | Preventing multi-query attack in location-based services | |
Gupta et al. | OMCPR: Optimal mobility aware cache data pre-fetching and replacement policy using spatial K-anonymity for LBS | |
Saravanan et al. | A novel approach of privacy protection of mobile users while using location-based services applications | |
Buchanan et al. | A privacy preserving method using privacy enhancing techniques for location based services | |
Um et al. | An advanced cloaking algorithm using Hilbert curves for anonymous location based service | |
Kim et al. | Hilbert‐order based spatial cloaking algorithm in road network | |
To et al. | A Hilbert-based framework for preserving privacy in location-based services | |
Kim et al. | Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data | |
Kumar et al. | M-Grid: a distributed framework for multidimensional indexing and querying of location based data | |
Li et al. | Trust based service optimization selection for cloud computing | |
Li et al. | A personalized range‐sensitive privacy‐preserving scheme in LBSs | |
Fan et al. | Revisiting the power of reinsertion for optimal targets of network attack | |
Lee et al. | A new cloaking algorithm using Hilbert curves for privacy protection | |
March et al. | Multi-attribute range queries on read-only DHT | |
Lin et al. | A MovingObject Index for Efficient Query Processing with Peer-Wise Location Privacy | |
Hashem et al. | Protecting privacy for distance and rank based group nearest neighbor queries | |
Luo et al. | Unchained Cellular Obfuscation Areas for Location Privacy in Continuous Location‐Based Service Queries | |
Xu et al. | A multi‐dimensional index for privacy‐preserving queries in cloud computing | |
Sahnoune et al. | Deloc: a delegation-based privacy-preserving mechanism for location-based services | |
Abi Sen et al. | Comparison among Cooperation, Anonymity and Cloak Area approaches for Preserving Privacy of IoT | |
Dang et al. | A novel hash-based file clustering scheme for efficient distributing, storing, and retrieving of large scale health records | |
Karakasidis et al. | Two-hop privacy-preserving nearest friend searches | |
Zhang et al. | Blockchain-Assisted Keyword Search Scheme for SWIM Service Based on Improved CSC-Cuckoo Filter | |
Zhu et al. | DLPM: A dynamic location protection mechanism supporting continuous queries |