Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

@article{Gedik2008ProtectingLP,
  title={Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms},
  author={B. Gedik and L. Liu},
  journal={IEEE Transactions on Mobile Computing},
  year={2008},
  volume={7},
  pages={1-18}
}
  • B. Gedik, L. Liu
  • Published 2008
  • Computer Science
  • IEEE Transactions on Mobile Computing
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency response, location-based advertisement, and location-based entertainment. An important challenge in the wide deployment of location-based services (LBSs) is the privacy-aware management of location information, providing safeguards for location privacy of mobile clients against vulnerabilities for abuse. This paper… Expand
846 Citations
Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services
  • 25
  • PDF
User-Defined Privacy Grid System for Continuous Location Based Services
  • Mr. G. SAI KUMAR, Mr. G. LAKPATHI
  • 2016
  • 1
A Privacy Enhancing Approach for Identity Inference Protection in Location-Based Services
  • 11
  • PDF
A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing
  • 22
  • Highly Influenced
  • PDF
An Adaptive Learning Model for k-Anonymity Location Privacy Protection
  • Gayathri Natesan, J. Liu
  • Computer Science
  • 2015 IEEE 39th Annual Computer Software and Applications Conference
  • 2015
  • 8
k-DLCA: An efficient approach for location privacy preservation in location-based services
  • 13
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 41 REFERENCES
A Customizable k-Anonymity Model for Protecting Location Privacy
  • 226
  • PDF
Location Privacy in Mobile Systems: A Personalized Anonymization Model
  • B. Gedik, L. Liu
  • Computer Science
  • 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05)
  • 2005
  • 767
  • PDF
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
  • 2,319
  • Highly Influential
  • PDF
A Privacy-Preserving Index for Range Queries
  • 495
  • PDF
k-Anonymity: A Model for Protecting Privacy
  • L. Sweeney
  • Computer Science
  • Int. J. Uncertain. Fuzziness Knowl. Based Syst.
  • 2002
  • 7,020
  • PDF
Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
  • 1,296
  • Highly Influential
  • PDF
Anonymizing Tables
  • 323
Protecting Respondents' Identities in Microdata Release
  • P. Samarati
  • Computer Science
  • IEEE Trans. Knowl. Data Eng.
  • 2001
  • 2,149
  • PDF
On the complexity of optimal K-anonymity
  • 818
  • PDF
...
1
2
3
4
5
...