Showing 1 - 2 results of 2 for search '"Spatial cloaking"', query time: 0.04s Refine Results
  1. 1

    Location-semantic-based location privacy protection for road network by Hui CHEN, Xiao-lin QIN

    Published 2016-08-01
    “…Mobile users suffer location privacy leakage threat as enjoy location-based services (LBS).Therefore,it was important to provide effective policy for location privacy protection.Conventional protection approaches were mainly based on spatial cloaking,which leads to the anonymous effectiveness suffer great reduction if the attacker obtains more background knowledge with respect to the cloaking region,especially semantic information of the location.To prevent sensitive location information leakage for the location semantics being analyzed,and consider the characteristic that most users move on road networks,a location-semantic-based location privacy protection method for road networks was pro-posed.The proposed method considers users' personalized privacy requirements well.The feasibility and effectiveness of the proposed method are verified through experiments for many scenarios.…”
    Get full text
    Article
  2. 2

    Research on location privacy protection of mobile terminals for maritime monitoring sensor networks by Xin SU, Su JIANG, Yiqing ZHOU

    Published 2021-12-01
    “…Mobile edge computing can support various maritime applications with high reliability and low delay.However, many security problems in computing task offloading exist.The risk of location privacy leakage of maritime mobile terminals during task offloading was analyzed and quantified.The related location privacy protection model was established and a dynamic cache and spatial cloaking-based location privacy protection (DS-LPP) algorithm was proposed.Simulation results show that DS-LPP algorithm has better performance of constructing anonymous space and selecting relay node than traditional algorithms while protecting the location privacy of maritime mobile terminals.Therefore, the DS-LPP algorithm can be effectively applied to maritime monitoring sensor network with relatively scanty communication and computing resources, and ensure the continuity of location privacy protection.…”
    Get full text
    Article