Location privacy-preserving mechanisms in location-based services: A comprehensive survey
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
Trajectory data mining: an overview
Y Zheng - ACM Transactions on Intelligent Systems and …, 2015 - dl.acm.org
The advances in location-acquisition and mobile computing techniques have generated
massive spatial trajectory data, which represent the mobility of a diversity of moving objects …
massive spatial trajectory data, which represent the mobility of a diversity of moving objects …
Geo-indistinguishability: Differential privacy for location-based systems
The growing popularity of location-based systems, allowing unknown/untrusted servers to
easily collect huge amounts of information regarding users' location, has recently started …
easily collect huge amounts of information regarding users' location, has recently started …
Achieving k-anonymity in privacy-aware location-based services
Location-Based Service (LBS) has become a vital part of our daily life. While enjoying the
convenience provided by LBS, users may lose privacy since the untrusted LBS server has …
convenience provided by LBS, users may lose privacy since the untrusted LBS server has …
A framework for protecting worker location privacy in spatial crowdsourcing
Spatial Crowdsourcing (SC) is a transformative platform that engages individuals, groups
and communities in the act of collecting, analyzing, and disseminating environmental, social …
and communities in the act of collecting, analyzing, and disseminating environmental, social …
The long road to computational location privacy: A survey
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …
the usage of mobile applications, among which many use location to provide geolocated …
Secure kNN computation on encrypted databases
WK Wong, DW Cheung, B Kao… - Proceedings of the 2009 …, 2009 - dl.acm.org
Service providers like Google and Amazon are moving into the SaaS (Software as a
Service) business. They turn their huge infrastructure into a cloud-computing environment …
Service) business. They turn their huge infrastructure into a cloud-computing environment …
[LIBRO][B] A general survey of privacy-preserving data mining models and algorithms
CC Aggarwal, PS Yu - 2008 - Springer
In recent years, privacy-preserving data mining has been studied extensively, because of
the wide proliferation of sensitive information on the internet. A number of algorithmic …
the wide proliferation of sensitive information on the internet. A number of algorithmic …
Towards secure mobile cloud computing: A survey
Mobile cloud computing is gaining popularity among mobile users. The ABI Research
predicts that the number of mobile cloud computing subscribers is expected to grow from …
predicts that the number of mobile cloud computing subscribers is expected to grow from …
Enhancing privacy through caching in location-based services
Privacy protection is critical for Location-Based Services (LBSs). In most previous solutions,
users query service data from the untrusted LBS server when needed, and discard the data …
users query service data from the untrusted LBS server when needed, and discard the data …