Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

  title={Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms},
  author={Bugra Gedik and Ling Liu},
  journal={IEEE Transactions on Mobile Computing},
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency response, location-based advertisement, and location-based entertainment. An important challenge in the wide deployment of location-based services (LBSs) is the privacy-aware management of location information, providing safeguards for location privacy of mobile clients against vulnerabilities for abuse. This paper… CONTINUE READING
Highly Influential
This paper has highly influenced 43 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 775 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 459 extracted citations

Transactions on Computational Science XXX

Lecture Notes in Computer Science • 2017
View 17 Excerpts
Highly Influenced

Introduction to Privacy-Preserving

View 20 Excerpts
Highly Influenced

A decade of security research in ubiquitous computing: results of a systematic literature review

Int. J. Pervasive Computing and Communications • 2016
View 5 Excerpts
Highly Influenced

776 Citations

Citations per Year
Semantic Scholar estimates that this publication has 776 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 26 references

Anonymizing Tables

ICDT • 2005
View 1 Excerpt

k-Anonymity: A Model for Protecting Privacy

International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems • 2002

Protecting Respondent’s Privacy in Microdata Release

P. Samarati
IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, 2001. • 2001
View 2 Excerpts

Similar Papers

Loading similar papers…