Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

@article{Gedik2008ProtectingLP,
  title={Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms},
  author={Bugra Gedik and Ling Liu},
  journal={IEEE Transactions on Mobile Computing},
  year={2008},
  volume={7},
  pages={1-18}
}
  • Bugra Gedik, Ling Liu
  • Published in
    IEEE Transactions on Mobile…
    2008
  • Computer Science
  • Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency response, location-based advertisement, and location-based entertainment. An important challenge in the wide deployment of location-based services (LBSs) is the privacy-aware management of location information, providing safeguards for location privacy of mobile clients against vulnerabilities for abuse. This paper… CONTINUE READING

    Create an AI-powered research feed to stay up to date with new papers like this posted to ArXiv

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 593 CITATIONS

    A K-Anonymity Based Schema for Location Privacy Preservation

    • Fan Fei, Shu Li, +3 authors Qiang Ni
    • Computer Science, Business
    • IEEE Transactions on Sustainable Computing
    • 2019
    VIEW 4 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Location Privacy Preservation for Mobile Users in Location-Based Services

    VIEW 7 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Oblivious Location-Based Service Query

    VIEW 5 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    A Dual Privacy Preserving Scheme in Continuous Location-Based Services

    VIEW 4 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Location Data Record Privacy Protection based on Differential Privacy Mechanism

    VIEW 13 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Usability heuristics for fast crime data anonymization in resource-constrained contexts

    VIEW 5 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    A Location-Based Services for Data Privacy using Grid System

    VIEW 3 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    Location disclosure risks of releasing trajectory distances

    VIEW 4 EXCERPTS
    CITES BACKGROUND
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    2007
    2020

    CITATION STATISTICS

    • 62 Highly Influenced Citations

    • Averaged 54 Citations per year from 2017 through 2019

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 27 REFERENCES

    Anonymizing Tables

    VIEW 1 EXCERPT

    On the complexity of optimal K-anonymity

    VIEW 1 EXCERPT

    A Model for Protecting Privacy

    • L. Sweeney
    • Int ’ l J . Uncertainty , Fuzziness , and Knowledge - Based Systems
    • 2002

    k-Anonymity: A Model for Protecting Privacy

    • Latanya Sweeney
    • Computer Science
    • International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
    • 2002
    VIEW 2 EXCERPTS