56
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Protecting location privacy in cloud services

, , , , , & show all

References

  • Gaurav, A., Gupta, B. B., & Panigrahi, P. K. (2022). A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system. Enterprise Information Systems, 1-25.
  • Jiang, H., Li, J., Zhao, P., Zeng, F., Xiao, Z., & Iyengar, A. (2021). Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Computing Surveys (CSUR), 54(1), 1-36
  • L. Duckham, M. Kulik. Location privacy and location-aware computing dynamic mobile gis: Investigating change in space and time. In J. Drummond, R. Billen, D. Forrest, D. E. Joao (Eds.), 2008.
  • Osatohanmwen, P., Oyegue, F. O., & Ogbonmwan, S. M. (2021). The Weibull–Burr XII {log logistic} Poisson lifetime model. Journal of Statistics and Management Systems, 1-36.
  • Tiwari, A., & Sharma, R. M. (2018). Realm Towards Service Optimization in Fog Computing. In Proceedings of the International Journal of Fog Computing (IJFC)” IGI Global.
  • Appadoo, S. S. & Gajpal, Y. (2021). Generalized exponential trapezoidal fuzzy numbers based on variance. Journal of Information and Optimization Sciences, 42(7), 1409-1424. doi: https://doi.org/10.1080/02522667.2021.1877403
  • Stefan Steiniger, Moritz Neun, and Alistair Edwardes. Foundations of location-based services lesson 1 cartouche 1-lecture notes on lbs, v. 1.0.
  • Tiwari, A., Sah, M. K., & Gupta, S. (2015). Efficient Service Utilization in Cloud Computing Exploitation Victimization as Revised Rough Set Optimization Service Parameters. Procedia Computer Science, 610-617.
  • Singh, N. K., & Mahajan, V. (2020). Detection of cyber cascade failure in smart grid substation using advance grey wolf optimization. Journal of Interdisciplinary Mathematics, 23(1), 69-79. doi: https://doi.org/10.1080/09720502.2020.1721664
  • Tiwari, A., & Sharma, R. M. (2021). OCC: A Hybrid Multiprocessing Computing Service Decision Making Using Ontology System. International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), 16(4), 96-116. doi: https://doi.org/10.4018/IJWLTT.20210701.oa6
  • Bugra Gedik and Ling Liu. Location privacy in mobile systems: A personalized anonymization model. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, IEEE Computer Society.
  • Chen, Y., Sun, J., Yang, Y., Li, T., Niu, X., & Zhou, H. (2022). PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs. International Journal of Intelligent Systems, 37(2), 1204-1221. doi: https://doi.org/10.1002/int.22666
  • Song, F., & Ma, T. (2022). A location privacy protection method in spatial crowdsourcing. Journal of Information Security and Applications, 65, 103095. doi: https://doi.org/10.1016/j.jisa.2021.103095
  • Wu, Z., Li, G., Shen, S., Lian, X., Chen, E., & Xu, G. (2021). Constructing dummy query sequences to protect location privacy and query privacy in location-based services. World Wide Web, 24(1), 25-49. doi: https://doi.org/10.1007/s11280-020-00830-x

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.