Wang et al., 2014 - Google Patents
A new privacy-preserving scheme for continuous query in location-based social networking servicesWang et al., 2014
View HTML- Document ID
- 6224291163878950227
- Author
- Wang E
- Ye Y
- Publication year
- Publication venue
- International journal of distributed sensor networks
External Links
Snippet
With continuous queries that are used widely in location based mobile social networking services, how to protect the location privacy effectively for continuous query has been a hot topic for researchers. In this paper, we analyze the existing location privacy protection …
- 238000004422 calculation algorithm 0 abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
- G06Q30/0241—Advertisement
- G06Q30/0251—Targeted advertisement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhang et al. | Interactive COVID-19 mobility impact and social distancing analysis platform | |
| Song et al. | A privacy-preserving continuous location monitoring system for location-based services | |
| Macha et al. | Personalized privacy preservation in consumer mobile trajectories | |
| Lin et al. | Modeling people's place naming preferences in location sharing | |
| Maouche et al. | Ap-attack: a novel user re-identification attack on mobility datasets | |
| Kuang et al. | Using location semantics to realize personalized road network location privacy protection | |
| Ma et al. | A voronoi-based location privacy-preserving method for continuous query in LBS | |
| Özkul | The algorithmic fix: Location intelligence, placemaking, and predictable futures | |
| Xu et al. | An efficient privacy-preserving point-of-interest recommendation model based on local differential privacy | |
| Duan et al. | Personalized service recommendations for travel using trajectory pattern discovery | |
| Zhang et al. | MPDP k-medoids: Multiple partition differential privacy preserving k-medoids clustering for data publishing in the Internet of Medical Things | |
| Chang et al. | The ethical issues of location-based services on big data and IoT | |
| Wang et al. | A new privacy-preserving scheme for continuous query in location-based social networking services | |
| Cho et al. | Placial analysis of events: a case study on criminological places | |
| Xue et al. | A novel destination prediction attack and corresponding location privacy protection method in geo-social networks | |
| Liu et al. | A novel trajectory similarity–based approach for location prediction | |
| Wang et al. | Cluster-indistinguishability: A practical differential privacy mechanism for trajectory clustering | |
| Steinman et al. | Risky business: Examining the 80-20 rule in relation to a RTM framework | |
| Xiong et al. | Locally differentially private continuous location sharing with randomized response | |
| Wang et al. | Time-of-arrival–based localization algorithm in mixed line-of-sight/non-line-of-sight environments | |
| Lee et al. | Path prediction method for effective sensor filtering in sensor registry system | |
| Liu et al. | Trajectory privacy data publishing scheme based on local optimisation and R-tree | |
| Hu et al. | Privacy implication of location-based service: Multi-class stochastic user equilibrium and incentive mechanism | |
| Chen et al. | Personalized trajectory privacy-preserving method based on sensitive attribute generalization and location perturbation | |
| Ye et al. | Toward location privacy protection in Spatial crowdsourcing |