Nothing Special   »   [go: up one dir, main page]

Um et al., 2010 - Google Patents

An advanced cloaking algorithm using Hilbert curves for anonymous location based service

Um et al., 2010

Document ID
7245911626395102680
Author
Um J
Kim H
Chang J
Publication year
Publication venue
2010 IEEE second international conference on social computing

External Links

Snippet

Location Based Services (LBSs) have recently attracted much attention due to the advancement of GPS facilitates. In LBS, the private and confidential information of user may disclose to others since LBS need a user's location. To protect the privacy of users, many …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • G06F17/30545Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • G06F17/30321Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30477Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30241Information retrieval; Database structures therefor; File system structures therefor in geographical information databases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks

Similar Documents

Publication Publication Date Title
Ghinita et al. PRIVE: anonymous location-based queries in distributed mobile systems
Talukder et al. Preventing multi-query attack in location-based services
Gupta et al. OMCPR: Optimal mobility aware cache data pre-fetching and replacement policy using spatial K-anonymity for LBS
Saravanan et al. A novel approach of privacy protection of mobile users while using location-based services applications
Buchanan et al. A privacy preserving method using privacy enhancing techniques for location based services
Um et al. An advanced cloaking algorithm using Hilbert curves for anonymous location based service
Kim et al. Hilbert‐order based spatial cloaking algorithm in road network
To et al. A Hilbert-based framework for preserving privacy in location-based services
Kim et al. Hilbert-curve based cryptographic transformation scheme for protecting data privacy on outsourced private spatial data
Kumar et al. M-Grid: a distributed framework for multidimensional indexing and querying of location based data
Li et al. Trust based service optimization selection for cloud computing
Li et al. A personalized range‐sensitive privacy‐preserving scheme in LBSs
Fan et al. Revisiting the power of reinsertion for optimal targets of network attack
Lee et al. A new cloaking algorithm using Hilbert curves for privacy protection
March et al. Multi-attribute range queries on read-only DHT
Lin et al. A MovingObject Index for Efficient Query Processing with Peer-Wise Location Privacy
Hashem et al. Protecting privacy for distance and rank based group nearest neighbor queries
Luo et al. Unchained Cellular Obfuscation Areas for Location Privacy in Continuous Location‐Based Service Queries
Xu et al. A multi‐dimensional index for privacy‐preserving queries in cloud computing
Sahnoune et al. Deloc: a delegation-based privacy-preserving mechanism for location-based services
Abi Sen et al. Comparison among Cooperation, Anonymity and Cloak Area approaches for Preserving Privacy of IoT
Dang et al. A novel hash-based file clustering scheme for efficient distributing, storing, and retrieving of large scale health records
Karakasidis et al. Two-hop privacy-preserving nearest friend searches
Zhang et al. Blockchain-Assisted Keyword Search Scheme for SWIM Service Based on Improved CSC-Cuckoo Filter
Zhu et al. DLPM: A dynamic location protection mechanism supporting continuous queries