Research progress on location privacy-preserving techniques
While providing plenty of convenience for users in daily life, the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy. The research about privacy-preserving techniques for LBS is becoming a hot spot, and there are a large number of research results. First...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-12-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016279/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539613674438656 |
---|---|
author | Sheng WAN Feng-hua LI Ben NIU Zhe SUN Hui LI |
author_facet | Sheng WAN Feng-hua LI Ben NIU Zhe SUN Hui LI |
author_sort | Sheng WAN |
collection | DOAJ |
description | While providing plenty of convenience for users in daily life, the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy. The research about privacy-preserving techniques for LBS is becoming a hot spot, and there are a large number of research results. First, background information of privacy protection for LBS was introduced, including application scenarios of LBS, the LBS framework, objects of privacy protection and system architectures of privacy protection. Second, adversary models and metrics for privacy protection in LBS was discussed. Third, four types of privacy-preserving techniques based on generalization and obfuscation for LBS were analyzed and summarized thoroughly. Finally, the potential research directions for privacy-preserving techniques for LBS in the future were shown. |
format | Article |
id | doaj-art-d05d801ab374429b9780a3fa4401d70b |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2016-12-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-d05d801ab374429b9780a3fa4401d70b2025-01-14T07:11:00ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2016-12-013712414159705404Research progress on location privacy-preserving techniquesSheng WANFeng-hua LIBen NIUZhe SUNHui LIWhile providing plenty of convenience for users in daily life, the increasingly popular location-based ser-vice(LBS) posed a serious threat to users' privacy. The research about privacy-preserving techniques for LBS is becoming a hot spot, and there are a large number of research results. First, background information of privacy protection for LBS was introduced, including application scenarios of LBS, the LBS framework, objects of privacy protection and system architectures of privacy protection. Second, adversary models and metrics for privacy protection in LBS was discussed. Third, four types of privacy-preserving techniques based on generalization and obfuscation for LBS were analyzed and summarized thoroughly. Finally, the potential research directions for privacy-preserving techniques for LBS in the future were shown.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016279/location-based serviceprivacy protectionlocation privacyprivacy metricsadversary model |
spellingShingle | Sheng WAN Feng-hua LI Ben NIU Zhe SUN Hui LI Research progress on location privacy-preserving techniques Tongxin xuebao location-based service privacy protection location privacy privacy metrics adversary model |
title | Research progress on location privacy-preserving techniques |
title_full | Research progress on location privacy-preserving techniques |
title_fullStr | Research progress on location privacy-preserving techniques |
title_full_unstemmed | Research progress on location privacy-preserving techniques |
title_short | Research progress on location privacy-preserving techniques |
title_sort | research progress on location privacy preserving techniques |
topic | location-based service privacy protection location privacy privacy metrics adversary model |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016279/ |
work_keys_str_mv | AT shengwan researchprogressonlocationprivacypreservingtechniques AT fenghuali researchprogressonlocationprivacypreservingtechniques AT benniu researchprogressonlocationprivacypreservingtechniques AT zhesun researchprogressonlocationprivacypreservingtechniques AT huili researchprogressonlocationprivacypreservingtechniques |