124
Views
0
CrossRef citations to date
0
Altmetric
Research papers

Optimal anonymous location privacy protection algorithm based on grid user density

, , , &
Pages 179-187 | Received 22 Feb 2019, Accepted 05 Jun 2020, Published online: 24 Jun 2020

References

  • Dargahi T, Ambrosin M, Conti M, et al. ABAKA: a novel attribute-based k-anonymous collaborative solution for LBSs. Comput Commun. 2016;85:1–13. doi: 10.1016/j.comcom.2016.03.002
  • Hongya Z, Qian Z. P2p encrypted location privacy protection based on untrusted users. Comput Technol Dev. 2016;26(5):104–109.
  • Mouratidis K, Ml Y. Shortest path computation with no information leakage. Proc VLDB Endowment. 2012;5(8):692–703.
  • Russell Paulet M, Kaosar G, Yi X, et al. Privacy-preserving and content-protecting location based queries. IEEE Trans Knowl Data Eng. 2014;26(5):1200–1210. doi: 10.1109/TKDE.2013.87
  • Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. Proceedings of the 1st international conference on Mobile Systems, Applications and Services; San Francisco (CA). 2003 May. p. 31–42.
  • Liu F, Hua KA, Cai Y. Query l-diversity in location-based services. Tenth international conference on Mobile Data Management: Systems, Services and Middleware; 2009 May 18–20; Taipei, Taiwan. IEEE; 2009. p. 436–442.
  • Yonggui Z, Yuhan Z. Location anonymity algorithm based on grid partition space. Appl Res Comput. 2012;28(9):3059–3061.
  • Weifang W, Mingrui C, Yaochi Z. An improved anonymity algorithm based on grid partitioning spatial location. Comput Simul. 2016;33(9):208–210.
  • Chow C-Y, Mokbel MF, Liu X. A peer-to-peer spatial cloaking algorithm for anonymous location-based services. Proceedings of the 14th annual ACM international symposium on Advances in Geographic Information Systems; Arlington (VA). 2006 Nov. p. 171–178.
  • Yufeng C, Xuejun L, Bin L. Location privacy protection methods for users to cooperate with each other based on game theory. Comput Sci. 2013;40(10):92–97.
  • Muhan W, Jia-Frame W, Jie Y, et al. A privacy protection method for location services. Comput Syst Appl. 2017;26(8):267–272.
  • Yingxue B, Wei F. Research on location privacy protection algorithm based on anonymous region optimization. Sci Technol Bull. 2018;34(02):147–150.
  • Jin X, Xiaoting S. Location privacy protection method based on similar path. Comput Syst Appl. 2018;27(12):33–39.
  • Kai X, Yonglong L, Xueli N, et al. Location privacy protection algorithm based on Geohash coding. Comput Eng Appl. 2019;55(01):102–108.
  • Junyi X. Privacy protection method of dispersed location based on grid migration. Modern Comput. 2019;15:32–36.
  • Demin H, Xia Z. K-anonymity privacy protection algorithm based on continuous query. Comput Appl Res. 2017;11:226–228 +232.
  • Jianxun L, Bing S, Rengui J, et al. Quadtree spatial indexing algorithm for image pyramid. CEA. 2011;37(10):11–13.
  • Mokbel MF, Chow CY, Aref WG. The new casper: query processing for location services without compromising privacy. Proceedings of the 32nd international conference on Very Large Data Bases. VLDB Endowment; Seoul. 2006 Sept. p. 763–774.
  • Brinkhoff T. A framework for generating network-based moving objects. GeoInformatica. 2002;6(2):153–180. doi: 10.1023/A:1015231126594
  • Zemao Z, Huidong H, Fan Z, et al. K-anonymous location privacy protection method for circular region division. J Beijing Jiaotong Univ. 2013;37(5):13–18.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.