Privacy preservation in big data from the communication perspective—A survey
The advancement of data communication technologies promotes widespread data collection
and transmission in various application domains, thereby expanding big data significantly …
and transmission in various application domains, thereby expanding big data significantly …
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services
Since the dummy-based method can provide precise query results without any requirement
for a third party or key sharing, it has been widely used to protect the user's location privacy …
for a third party or key sharing, it has been widely used to protect the user's location privacy …
Privacy games along location traces: A game-theoretic framework for optimizing location privacy
The mainstream approach to protecting the privacy of mobile users in location-based
services (LBSs) is to alter (eg, perturb, hide, and so on) the users' actual locations in order to …
services (LBSs) is to alter (eg, perturb, hide, and so on) the users' actual locations in order to …
A geo-indistinguishable location perturbation mechanism for location-based services supporting frequent queries
As location-based services (LBSs) on smartphones become increasingly popular, such
services are causing serious privacy concerns, because many users are unwilling to see …
services are causing serious privacy concerns, because many users are unwilling to see …
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services
Human mobility is highly predictable. Individuals tend to only visit a few locations with high
frequency, and to move among them in a certain sequence reflecting their habits and daily …
frequency, and to move among them in a certain sequence reflecting their habits and daily …
Supporting users to take informed decisions on privacy settings of personal devices
Today, personal information has never been this prone to risk given the current
advancement in technologies especially on personal devices. These devices are able to …
advancement in technologies especially on personal devices. These devices are able to …
Personalization vs. privacy in big data analysis
Personalization is the process of adapting the output of a system to a user's context and
profile. User information such as geographical location, academic and professional …
profile. User information such as geographical location, academic and professional …
Equivalent mechanism: Releasing location data with errors through differential privacy
Location-based services are raising remarkable convenience to our daily life while seriously
threatening the location privacy of individuals. Differential privacy provides a promising …
threatening the location privacy of individuals. Differential privacy provides a promising …
A privacy-preserving continuous location monitoring system for location-based services
D Song, J Sim, K Park, M Song - International Journal of …, 2015 - journals.sagepub.com
To protect users' private locations in location-based services, various location
anonymization techniques have been proposed. The most commonly used technique is …
anonymization techniques have been proposed. The most commonly used technique is …
Adaptive location perturbation
An example of adaptive location perturbation can include selecting, by a processing
resource of a mobile device executing instructions stored on a non-transitory medium …
resource of a mobile device executing instructions stored on a non-transitory medium …