[go: up one dir, main page]

Wang et al., 2014 - Google Patents

A new privacy-preserving scheme for continuous query in location-based social networking services

Wang et al., 2014

View HTML
Document ID
6224291163878950227
Author
Wang E
Ye Y
Publication year
Publication venue
International journal of distributed sensor networks

External Links

Snippet

With continuous queries that are used widely in location based mobile social networking services, how to protect the location privacy effectively for continuous query has been a hot topic for researchers. In this paper, we analyze the existing location privacy protection …
Continue reading at journals.sagepub.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • G06Q30/0241Advertisement
    • G06Q30/0251Targeted advertisement
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS

Similar Documents

Publication Publication Date Title
Zhang et al. Interactive COVID-19 mobility impact and social distancing analysis platform
Song et al. A privacy-preserving continuous location monitoring system for location-based services
Macha et al. Personalized privacy preservation in consumer mobile trajectories
Lin et al. Modeling people's place naming preferences in location sharing
Maouche et al. Ap-attack: a novel user re-identification attack on mobility datasets
Kuang et al. Using location semantics to realize personalized road network location privacy protection
Ma et al. A voronoi-based location privacy-preserving method for continuous query in LBS
Özkul The algorithmic fix: Location intelligence, placemaking, and predictable futures
Xu et al. An efficient privacy-preserving point-of-interest recommendation model based on local differential privacy
Duan et al. Personalized service recommendations for travel using trajectory pattern discovery
Zhang et al. MPDP k-medoids: Multiple partition differential privacy preserving k-medoids clustering for data publishing in the Internet of Medical Things
Chang et al. The ethical issues of location-based services on big data and IoT
Wang et al. A new privacy-preserving scheme for continuous query in location-based social networking services
Cho et al. Placial analysis of events: a case study on criminological places
Xue et al. A novel destination prediction attack and corresponding location privacy protection method in geo-social networks
Liu et al. A novel trajectory similarity–based approach for location prediction
Wang et al. Cluster-indistinguishability: A practical differential privacy mechanism for trajectory clustering
Steinman et al. Risky business: Examining the 80-20 rule in relation to a RTM framework
Xiong et al. Locally differentially private continuous location sharing with randomized response
Wang et al. Time-of-arrival–based localization algorithm in mixed line-of-sight/non-line-of-sight environments
Lee et al. Path prediction method for effective sensor filtering in sensor registry system
Liu et al. Trajectory privacy data publishing scheme based on local optimisation and R-tree
Hu et al. Privacy implication of location-based service: Multi-class stochastic user equilibrium and incentive mechanism
Chen et al. Personalized trajectory privacy-preserving method based on sensitive attribute generalization and location perturbation
Ye et al. Toward location privacy protection in Spatial crowdsourcing