Most existing cloaking techniques only focus on achieving location k-anonymity. However, maintaining location k-anonymity alone is not enough to counter query homogeneity attacks. In this paper, we first define the query l-diversity concept in location-based services, and then propose a technique to achieve query ldiversity. The proposed technique is compared with the improved Interval Cloak technique using simulation; and the extensive results indicate that our technique is better in protecting user privacy. © 2009 IEEE
Most existing cloaking techniques are based on a three-tier architecture: mobile users, a trusted an...
Use of Internet enabled mobile devices has facilitated the rapid development of location-based servi...
Abstract. Protection of users ’ privacy has been a central issue for location-based services (LBSs)....
Most existing cloaking techniques only focus on achieving location k-anonymity. However, maintaining...
This paper examines major privacy concerns in location-based services. Most user privacy techniques ...
Abstract—Location obfuscation using cloaking regions pre-serves location anonymity by hiding the tru...
Abstract — Privacy protection has recently received considerable attention in location-based service...
Use of Internet enabled mobile devices has facilitated the rapid Use of Internet enabled mobile devi...
Part 4: Applications of Parallel and Distributed ComputingInternational audienceA user’s staying poi...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Abstract-The prevailing infrastructure of ubiquitous computing paradigm on the one hand making signi...
Location-based services (LBSs) have become a profitable market because they offer real-time and loca...
With the widespread use of mobile devices, the location-based service (LBS) applications become incr...
In this paper, we present a cloaking algorithm called DirectedCloaking to protect user\u27s location...
In location-based services, users with location-aware mobile devices are able to make queries about ...
Most existing cloaking techniques are based on a three-tier architecture: mobile users, a trusted an...
Use of Internet enabled mobile devices has facilitated the rapid development of location-based servi...
Abstract. Protection of users ’ privacy has been a central issue for location-based services (LBSs)....
Most existing cloaking techniques only focus on achieving location k-anonymity. However, maintaining...
This paper examines major privacy concerns in location-based services. Most user privacy techniques ...
Abstract—Location obfuscation using cloaking regions pre-serves location anonymity by hiding the tru...
Abstract — Privacy protection has recently received considerable attention in location-based service...
Use of Internet enabled mobile devices has facilitated the rapid Use of Internet enabled mobile devi...
Part 4: Applications of Parallel and Distributed ComputingInternational audienceA user’s staying poi...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and...
Abstract-The prevailing infrastructure of ubiquitous computing paradigm on the one hand making signi...
Location-based services (LBSs) have become a profitable market because they offer real-time and loca...
With the widespread use of mobile devices, the location-based service (LBS) applications become incr...
In this paper, we present a cloaking algorithm called DirectedCloaking to protect user\u27s location...
In location-based services, users with location-aware mobile devices are able to make queries about ...
Most existing cloaking techniques are based on a three-tier architecture: mobile users, a trusted an...
Use of Internet enabled mobile devices has facilitated the rapid development of location-based servi...
Abstract. Protection of users ’ privacy has been a central issue for location-based services (LBSs)....