Location privacy-preserving mechanisms in location-based services: A comprehensive survey

H Jiang, J Li, P Zhao, F Zeng, Z **ao… - ACM Computing Surveys …, 2021 - dl.acm.org
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …

Trajectory data mining: an overview

Y Zheng - ACM Transactions on Intelligent Systems and …, 2015 - dl.acm.org
The advances in location-acquisition and mobile computing techniques have generated
massive spatial trajectory data, which represent the mobility of a diversity of moving objects …

Geo-indistinguishability: Differential privacy for location-based systems

ME Andrés, NE Bordenabe, K Chatzikokolakis… - Proceedings of the …, 2013 - dl.acm.org
The growing popularity of location-based systems, allowing unknown/untrusted servers to
easily collect huge amounts of information regarding users' location, has recently started …

Achieving k-anonymity in privacy-aware location-based services

B Niu, Q Li, X Zhu, G Cao, H Li - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
Location-Based Service (LBS) has become a vital part of our daily life. While enjoying the
convenience provided by LBS, users may lose privacy since the untrusted LBS server has …

A framework for protecting worker location privacy in spatial crowdsourcing

H To, G Ghinita, C Shahabi - Proceedings of the VLDB Endowment, 2014 - dl.acm.org
Spatial Crowdsourcing (SC) is a transformative platform that engages individuals, groups
and communities in the act of collecting, analyzing, and disseminating environmental, social …

The long road to computational location privacy: A survey

V Primault, A Boutet, SB Mokhtar… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …

Secure kNN computation on encrypted databases

WK Wong, DW Cheung, B Kao… - Proceedings of the 2009 …, 2009 - dl.acm.org
Service providers like Google and Amazon are moving into the SaaS (Software as a
Service) business. They turn their huge infrastructure into a cloud-computing environment …

[LIBRO][B] A general survey of privacy-preserving data mining models and algorithms

CC Aggarwal, PS Yu - 2008 - Springer
In recent years, privacy-preserving data mining has been studied extensively, because of
the wide proliferation of sensitive information on the internet. A number of algorithmic …

Towards secure mobile cloud computing: A survey

AN Khan, MLM Kiah, SU Khan, SA Madani - Future generation computer …, 2013 - Elsevier
Mobile cloud computing is gaining popularity among mobile users. The ABI Research
predicts that the number of mobile cloud computing subscribers is expected to grow from …

Enhancing privacy through caching in location-based services

B Niu, Q Li, X Zhu, G Cao, H Li - 2015 IEEE conference on …, 2015 - ieeexplore.ieee.org
Privacy protection is critical for Location-Based Services (LBSs). In most previous solutions,
users query service data from the untrusted LBS server when needed, and discard the data …