期刊文献+
共找到246,274篇文章
< 1 2 250 >
每页显示 20 50 100
User location privacy protection mechanism for location-based services 被引量:7
1
作者 Yan He Jiageng Chen 《Digital Communications and Networks》 SCIE CSCD 2021年第2期264-276,共13页
With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing co... With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing concern.This has led to great difficulty in establishing trust between the users and the service providers,hindering the development of LBS for more comprehensive functions.In this paper,we first establish a strong identity verification mechanism to ensure the authentication security of the system and then design a new location privacy protection mechanism based on the privacy proximity test problem.This mechanism not only guarantees the confidentiality of the user s information during the subsequent information interaction and dynamic data transmission,but also meets the service provider's requirements for related data. 展开更多
关键词 Internet of things location-based services Location privacy Privacy protection mechanism CONFIDENTIALITY
在线阅读 下载PDF
Location Privacy in Device-Dependent Location-Based Services:Challenges and Solution 被引量:1
2
作者 Yuhang Wang Yanbin Sun +4 位作者 Shen Su Zhihong Tian Mohan Li Jing Qiu Xianzhi Wang 《Computers, Materials & Continua》 SCIE EI 2019年第6期983-993,共11页
With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)wi... With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)will not only send the information according to the user’s location,more significant,he also provides a service device which will be carried by the user.DLBS has been successfully practised in some of the large cities around the world,for example,the shared bicycle in Beijing and London.In this paper,we,for the first time,blow the whistle of the new location privacy challenges caused by DLBS,since the service device is enabled to perform the localization without the permission of the user.To conquer these threats,we design a service architecture along with a credit system between DLBS provider and the user.The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy,DLBS provider has to sacrifice their revenue in order to gain extra location information of their device.We make the simulation of our proposed scheme and the result convince its effectiveness. 展开更多
关键词 Location privacy device-dependent location-based service location-based service credit system location privacy preserving mechanism shared bicycle
在线阅读 下载PDF
Design and implementation of user information sharing system using location-based services for social network services 被引量:1
3
作者 Donsu Lee Junghoon Shin Sangjun Lee 《Journal of Measurement Science and Instrumentation》 CAS 2012年第2期169-172,共4页
Internet takes a role as a place for communication between people beyond a space simply for the acquisition of information.Recently,social network service(SNS)reflecting human’s basic desire for talking and communica... Internet takes a role as a place for communication between people beyond a space simply for the acquisition of information.Recently,social network service(SNS)reflecting human’s basic desire for talking and communicating with others is focused on around the world.And location-based service(LBS)is a service that provides various life conveniences like improving productivity through location information,such as GPS and WiFi.This paper suggests an application combining LBS and SNS based on Android OS.By using smart phone which is personal mobile information equipment,it combines location information with user information and SNS so that the service can be developed.It also maximizes sharing and use of information via twit based on locations of friends.This proposed system is aims for users to show online identity more actively and more conveniently. 展开更多
关键词 android OS social network service(SNS) location-based service(LBS) Google maps TWITTER Open API
在线阅读 下载PDF
Toward Seamless Indoor-Outdoor Applications:Developing Stakeholder-Oriented Location-Based Services 被引量:2
4
作者 Kohei OGAWA Edward VERBREE +2 位作者 Sisi ZLATANOVA Naohiko KOHTAKE Yoshiaki OHKAMI 《Geo-Spatial Information Science》 2011年第2期109-118,共10页
Location-Based Services (LBS),an emerging new business based on smartphone and mobile networks,are becoming more and more popular.Most of these LBSs,however,only offer non-seamless indoor/outdoor applications and simp... Location-Based Services (LBS),an emerging new business based on smartphone and mobile networks,are becoming more and more popular.Most of these LBSs,however,only offer non-seamless indoor/outdoor applications and simple applications without giving stakeholders the chance to play an active role.Our specific aim is to solve these issues.This paper presents concepts to solve these issues by expanding the Open Location Services Interface Standard (OpenLS) to allow seamless indoor/outdoor positioning and to extend the content of the services to include information recommended by stakeholders. 展开更多
关键词 location based services OpenLS STAKEHOLDER SEAMLESS INDOOR OUTDOOR APPLICATIONS standardized IMES
原文传递
Location and Its Semantics in Location-Based Services 被引量:1
5
作者 ZHAO Dongqing LUE Zhiping ZHANG Xiguang 《Geo-Spatial Information Science》 2007年第2期145-150,共6页
Starting with a simple presentation of location determination techniques, physical location and geographic location as two common kinds of location description methods are discussed. The semantic location concept is t... Starting with a simple presentation of location determination techniques, physical location and geographic location as two common kinds of location description methods are discussed. The semantic location concept is then introduced and a correction is given, which especially emphasizes that location property is an important part of semantic location. By analyzing the connotation and extension of every geographic location, what should be contained in a location property is determined. Using a hierarchical model, the relations and associations among locations are clearly described. To realize a formalized description of semantic location, an ontology technique that can adequately describe semantic information of location is used. Organized by ontology web language, a location ontology model allows semantic location to be read and processed by computer. The location ontology model realizes the knowledge description of location information and establishes an important foundation to personalized preference services in location based services. 展开更多
关键词 personalized preference services LOCATION SEMANTICS ONTOLOGY
在线阅读 下载PDF
Privacy Preserving Scheme for Location-Based Services 被引量:1
6
作者 Youssef Gahi Mouhcine Guennoun +1 位作者 Zouhair Guennoun Khalil El-Khatib 《Journal of Information Security》 2012年第2期105-112,共8页
Homomorphic encryption schemes make it possible to perform arithmetic operations, like additions and multiplications, over encrypted values. This capability provides enhanced protection for data and offers new researc... Homomorphic encryption schemes make it possible to perform arithmetic operations, like additions and multiplications, over encrypted values. This capability provides enhanced protection for data and offers new research directions, including blind data processing. Using homomorphic encryption schemes, a Location-Based Service (LBS) can process encrypted inputs to retrieve encrypted location-related information. The retrieved encrypted data can only be decrypted by the user who requested the data. The technology still faces two main challenges: the encountered processing time and the upper limit imposed on the allowed number of operations. However, the protection of users’ privacy achieved through this technology makes it attractive for more research and enhancing. In this paper we use homomorphic encryption schemes to build a fully secure system that allows users to benefit from location-based services while preserving the confidentiality and integrity of their data. Our novel system consists of search circuits that allow an executor (i.e. LBS server) to receive encrypted inputs/requests and then perform a blind search to retrieve encrypted records that match the selection criterion. A querier can send the user’s position and the service type he/she is looking for, in encrypted form, to a server and then the server would respond to the request without any knowledge of the contents of the request and the retrieved records. We further propose a prototype that improves the practicality of our system. 展开更多
关键词 PRIVACY LOCATION BASED services Homomorphic ENCRYPTION
暂未订购
The NCC: An Improved Anonymous Method for Location-Based Services Based on Casper
7
作者 Wenqi Liu Jie Feng Guangwei Wang 《国际计算机前沿大会会议论文集》 2017年第2期129-131,共3页
Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In add... Casper Cloak is a privacy protection method based on K-anonymity algorithm. To be anonymous, Casper Cloak needs to search regional sibling and parent node, which requires a complex process and huge expenditure. In addition,the anonymous area has space redundancy and it is not accurate enough to achieve high Location-Based Services (LBS) quality. To address these problems,this paper proposes an improved privacy protection method-NCC, based on the Casper Cloak. To reduce the unnecessary search, NCC introduced the concept of the first sibling node. NCC also improves the LBS quality by considering the characteristics of user mobility. Moreover, the improved method,NCC, which is incorporated with a redundancy optimization processing strategy,realizing more precise in the anonymous area and accurately guaranteeing the related degree of privacy. Adopting NCC verification experiments reflects varied advantages as bellow: (1) By reducing 80% searching time, NCC highly improved searching process. (2) The anonymous area produced in NCC not only meet users' anonymous demands, but the direction of the mobility which improves 4 times accuracy of services in comparison with Casper mode.(3) According to optimization strategy, NCC can reach minimum anonymous area index, increasing the rates of anonymous optimization in original algorithm. 展开更多
关键词 PRIVACY protection CASPER CLOAK location-based services REDUNDANCY optimization
在线阅读 下载PDF
Privacy Quantification Model Based on the Bayes Conditional Risk in Location-Based Services 被引量:6
8
作者 Xuejun Zhang Xiaolin Gui +2 位作者 Feng Tian Si Yu Jian An 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第5期452-462,共11页
The widespread use of Location-Based Services (LBSs), which allows untrusted service providers to collect large quantities of information regarding users' locations, has raised serious privacy concerns. In response... The widespread use of Location-Based Services (LBSs), which allows untrusted service providers to collect large quantities of information regarding users' locations, has raised serious privacy concerns. In response to these issues, a variety of LBS Privacy Protection Mechanisms (LPPMs) have been recently proposed. However, evaluating these LPPMs remains problematic because of the absence of a generic adversarial model for most existing privacy metrics. In particular, the relationships between these metrics have not been examined in depth under a common adversarial model, leading to a possible selection of the inappropriate metric, which runs the risk of wrongly evaluating LPPMs. In this paper, we address these issues by proposing a privacy quantification model, which is based on Bayes conditional privacy, to specify a general adversarial model. This model employs a general definition of conditional privacy regarding the adversary's estimation error to compare the different LBS privacy metrics. Moreover, we present a theoretical analysis for specifying how to connect our metric with other popular LBS privacy metrics. We show that our privacy quantification model permits interpretation and comparison of various popular LBS privacy metrics under a common perspective. Our results contribute to a better understanding of how privacy properties can be measured, as well as to the better selection of the most appropriate metric for any given LBS application. 展开更多
关键词 location-based services Bayes decision estimator privacy metric adversarial mode
原文传递
Expanding the SDI environment:comparing current spatial data infrastructure with emerging indoor location-based services 被引量:1
9
作者 David J.Coleman Abbas Rajabifard Kris W.Kolodziej 《International Journal of Digital Earth》 SCIE EI CSCD 2016年第6期629-647,共19页
The authors compare key elements of the emerging field of Indoor Location-Based Services(Indoor LBS)to those currently found in spatial data infrastructure(SDI)programs.After a brief review of SDIs and Location-Based ... The authors compare key elements of the emerging field of Indoor Location-Based Services(Indoor LBS)to those currently found in spatial data infrastructure(SDI)programs.After a brief review of SDIs and Location-Based Services,the corresponding drivers,characteristics and emerging issues within the field of Indoor LBS are introduced and discussed.A comparative framework relates the two in terms of the criteria‘People’,‘Data’,‘Technologies’,‘Standards’and‘Policies/Institutional Arrangements’.After highlighting key similarities and differences,the authors suggested three areas–definition of common framework datasets in Indoor LBS,more effective use of volunteered geographic information by SDI programs and development of appropriate privacy policies by both communities–that may benefit from sharing‘lessons learned’. 展开更多
关键词 Spatial data infrastructure location-based services INDOOR POSITIONING mapping GEOSPATIAL
原文传递
DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services 被引量:1
10
作者 Long LI Jianbo HUANG +3 位作者 Liang CHANG Jian WENG Jia CHEN Jingjing LI 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第5期197-205,共9页
Since smartphones embedded with positioning systems and digital maps are widely used,location-based services(LBSs)are rapidly growing in popularity and providing unprecedented convenience in people’s daily lives;howe... Since smartphones embedded with positioning systems and digital maps are widely used,location-based services(LBSs)are rapidly growing in popularity and providing unprecedented convenience in people’s daily lives;however,they also cause great concern about privacy leakage.In particular,location queries can be used to infer users’sensitive private information,such as home addresses,places of work and appointment locations.Hence,many schemes providing query anonymity have been proposed,but they typically ignore the fact that an adversary can infer real locations from the correlations between consecutive locations in a continuous LBS.To address this challenge,a novel dual privacy-preserving scheme(DPPS)is proposed that includes two privacy protection mechanisms.First,to prevent privacy disclosure caused by correlations between locations,a correlation model is proposed based on a hidden Markov model(HMM)to simulate users’mobility and the adversary’s prediction probability.Second,to provide query probability anonymity of each single location,an advanced k-anonymity algorithm is proposed to construct cloaking regions,in which realistic and indistinguishable dummy locations are generated.To validate the effectiveness and efficiency of DPPS,theoretical analysis and experimental verification are further performed on a real-life dataset published by Microsoft,i.e.,GeoLife dataset. 展开更多
关键词 location-based services PRIVACY-PRESERVING hidden Markov model K-ANONYMITY query probability
原文传递
A Scalable Testing Framework for Location-Based Services 被引量:1
11
作者 Jiang Yu Andrew Tappenden +1 位作者 James Miller Michael Smith 《Journal of Computer Science & Technology》 SCIE EI CSCD 2009年第2期386-404,共19页
A novel testing framework for location based services is introduced. In particular, the paper showcases a novel architecture for such a framework. The implementation of the framework illustrates both the functionality... A novel testing framework for location based services is introduced. In particular, the paper showcases a novel architecture for such a framework. The implementation of the framework illustrates both the functionality and the feasibility of the framework proposed and the utility of the architecture. The new framework is evaluated through comparison to several other methodologies currently available for the testing of location-based applications. A case study is presented in which the testing framework was applied to a typical mobile service tracking system. It is concluded that the proposed testing framework achieves the best coverage of the entire location based service testing problem of the currently available methodologies; being equipped to test the widest array of application attributes and allowing for the automation of testing activities. 展开更多
关键词 location based applications location-based services M-COMMERCE software testing
原文传递
The digital‘connected’earth:open technology for providing location-based services on degraded communication environments
12
作者 Ramón Piedrafita Rubén Béjar +2 位作者 Rubén Blasco Alvaro Marco F.Javier Zarazaga-Soria Aragón 《International Journal of Digital Earth》 SCIE EI 2018年第8期761-782,共22页
n the current world,it is easy to listen that everybody and everything is connected.Over this connected world,the concept of location-based services has grown in order to provide digital services in everyplace and at ... n the current world,it is easy to listen that everybody and everything is connected.Over this connected world,the concept of location-based services has grown in order to provide digital services in everyplace and at every time.Nevertheless,this is not 100%true because the connection is not guaranteed for many people and in many places.These are the Degraded Communications Environments(DCE),environments where the availability of high-speed communications is not guaranteed in at least the 75%of the time.This paper works over the experience of a previous work in developing light protocols that do not need broadband for communication.This work provides an extension of these protocols for the inclusion of mobile devices as elements of the communication process and a set of libraries to allow the development of applications in DCE.The work done has involved the development of two frameworks:an Android framework that makes the incorporation of Android devices easier and a server-based framework that provides the server side for the development of the referred applications.A use case that uses these two frameworks has been developed.Finally,all technology developed is available throw a public Git repository. 展开更多
关键词 location-based services degraded communications environments open technology
原文传递
A Boon for Trade in Services
13
作者 ZHANG SHASHA 《ChinAfrica》 2026年第3期22-24,共3页
Saud Khan,a Pakistani physician,collected his work and residence permits at the Yangpu Government Service Centre in Danzhou City,Hainan Province,on 18 December 2025.Khan had arrived in Hainan three months earlier to p... Saud Khan,a Pakistani physician,collected his work and residence permits at the Yangpu Government Service Centre in Danzhou City,Hainan Province,on 18 December 2025.Khan had arrived in Hainan three months earlier to participate in a medical training programme at Hainan Western Central Hospital.By the time the programme concluded,he had made up his mind to stay and broaden his professional experience and long-term career prospects in Hainan. 展开更多
关键词 TRADE residence permit Hainan province work residence permits work permit Yangpu government service centre medical training programme services
原文传递
Event Detection on Monitoring Internet of Things Services by Fusing Multiple Observations
14
作者 Mao Yanfang Zhang Yang +2 位作者 Cheng Bo Zhao Shuai Chen Junliang 《China Communications》 2026年第1期234-254,共21页
Ensuring an information fabric safe is critical and mandatory.For its related Internet of Things(IoT)service system running on the open Internet,existing host-based monitoring methods may fail due to only inspecting s... Ensuring an information fabric safe is critical and mandatory.For its related Internet of Things(IoT)service system running on the open Internet,existing host-based monitoring methods may fail due to only inspecting software,and the physical system may not be able to be protected.In this paper,a nonintrusive virtual machine(VM)-based runtime protection framework is provided to protect the physical system with the isolated IoT services as a controlling means.Compared with existing solutions,the framework gets inconsistent and untrusted observation knowledge from multiple observation sources,and enforces property policies concurrently and incrementally in a competing-game way to avoid compositional problems.In addition,the monitoring is implemented without any modification to the protected system.Experiments are conducted to validate the proposed techniques. 展开更多
关键词 anomaly knowledge checking IoT service runtime monitoring
在线阅读 下载PDF
Multi-Criteria Discovery of Communities in Social Networks Based on Services
15
作者 Karim Boudjebbour Abdelkader Belkhir Hamza Kheddar 《Computers, Materials & Continua》 2026年第3期984-1005,共22页
Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for so... Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties.Although several community detection methods have been proposed,many are unsuitable for social networks due to significant limitations.Specifically,most approaches depend mainly on user-user structural links while overlooking service-centric,semantic,and multi-attribute drivers of community formation,and they also lack flexible filtering mechanisms for large-scale,service-oriented settings.Our proposed approach,called community discovery-based service(CDBS),leverages user profiles and their interactions with consulted web services.The method introduces a novel similarity measure,global similarity interaction profile(GSIP),which goes beyond typical similarity measures by unifying user and service profiles for all attributes types into a coherent representation,thereby clarifying its novelty and contribution.It applies multiple filtering criteria related to user attributes,accessed services,and interaction patterns.Experimental comparisons against Louvain,Hierarchical Agglomerative Clustering,Label Propagation and Infomap show that CDBS reveals the higher performance as it achieves 0.74 modularity,0.13 conductance,0.77 coverage,and significantly fast response time of 9.8 s,even with 10,000 users and 400 services.Moreover,community discoverybased service consistently detects a larger number of communities with distinct topics of interest,underscoring its capacity to generate detailed and efficient structures in complex networks.These results confirm both the efficiency and effectiveness of the proposed method.Beyond controlled evaluation,communities discovery based service is applicable to targeted recommendations,group-oriented marketing,access control,and service personalization,where communities are shaped not only by user links but also by service engagement. 展开更多
关键词 Social network communities discovery complex network CLUSTERING web services similarity measure
在线阅读 下载PDF
Evidence Summary for Discharge Preparation Services in Patients After Total Knee Arthroplasty
16
作者 Jiapei Li Jiuqun Li Jinli Wang 《Journal of Clinical and Nursing Research》 2026年第1期96-107,共12页
Objective:To systematically summarize and evaluate the evidence on discharge preparation services for patients undergoing total knee arthroplasty,providing an evidence-based foundation for developing scientific and st... Objective:To systematically summarize and evaluate the evidence on discharge preparation services for patients undergoing total knee arthroplasty,providing an evidence-based foundation for developing scientific and standardized discharge preparation intervention programs in clinical practice.Methods:Following the“5S”evidence model,literature such as guidelines,expert consensuses,evidence summaries and randomized controlled trials related to discharge preparation services for total knee arthroplasty patients were retrieved from relevant websites and databases,both domestic and international,from database inception to August 31,2025.Two researchers independently screened the literature,conducted quality appraisals,and extracted and synthesized the evidence.Results:A total of 15 articles were included,comprising 3 guidelines,4 expert consensuses,3 evidence summaries,3 systematic reviews and 2 randomized controlled trials.Ultimately,23 pieces of evidence were summarized across five aspects.Conclusion:This study synthesizes the evidence on discharge preparation services for patients undergoing total knee arthroplasty.It is recommended that healthcare professionals apply this evidence in clinical practice,considering specific circumstances and patient needs. 展开更多
关键词 Total knee arthroplasty Discharge preparation service Evidence summary Evidence-based nursing REHABILITATION
暂未订购
Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services 被引量:6
17
作者 Yu Wang Dingbang Xu Fan Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期243-259,共17页
Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonym... Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonymity or obfuscation techniques to protect location privacy of mobile users. Though effective in certain scenarios, these existing techniques usually assume that a user has a constant privacy requirement along spatial and/or temporal dimensions, which may be not true in real-life scenarios. In this paper, we introduce a new location privacy problem: Location-aware Location Privacy Protection (L2P2) problem, where users can define dynamic and diverse privacy requirements for different locations. The goal of the L2P2 problem is to find the smallest cloaking area for each location request so that diverse privacy requirements over spatial and/or temporal dimensions are satisfied for each user. In this paper, we formalize two versions of the L2P2 problem, and propose several efficient heuristics to provide such location-aware location privacy protection for mobile users. Through extensive simulations over large synthetic and real-life datasets, we confirm the effectiveness and efficiency of the proposed L2P2 algorithms. 展开更多
关键词 location privacy K-ANONYMITY cloaking algorithm location-based service mobile networks
原文传递
Trade-offs and synergies among ecosystem services and their responses to land use change:A Case study from the subtropical hilly region of Guangdong,Jiangxi and Fujian provinces in China
18
作者 WU Jieling ZHA Ruibo +3 位作者 JIANG Xingxue ZHA Xuan HUANG Bowen ZHANG Liu 《Journal of Mountain Science》 2026年第1期343-357,共15页
The Guangdong,Jiangxi and Fujian(GJF)provinces,located in the subtropical region of southeastern China,is one of the national key regions for soil erosion control and ecological restoration.This region is characterize... The Guangdong,Jiangxi and Fujian(GJF)provinces,located in the subtropical region of southeastern China,is one of the national key regions for soil erosion control and ecological restoration.This region is characterized by extensive red soil development and high rainfall erosivity,making it a representative landscape for exploring the interactions between land use change(LUC)and ecosystem services(ES).Despite the recognized importance of ES in hilly regions,comprehensive assessing the impacts of LUC on ES remain limited.This study investigates five key ES:water yield,soil conservation,carbon conservation,food supply,and habitat quality in GJF region from 2000 to 2020.By applying the InVEST model and the Geodetector method,we assessed the trade-offs,synergies,and transitions among ES,identified the natural and social drivers of ES dynamics,and quantified the contribution of LUC to ES changes using the ecosystem service contribution index.The results showed that cropland and woodland were the dominant land use types.Ecological restoration efforts positively influenced ES,with synergies intensifying and trade-offs diminishing over time.Land use conversions,particularly among woodland,grassland,and cropland,exerted significant impacts on ES.In particular,the conversion of woodland to other land uses had markedly negative effects on soil conservation,carbon conservation,and habitat quality.Forest cover was identified as a major driver of ES dynamics.These findings highlight the importance of maintaining and expanding forest and grassland cover,strengthening red soil conservation,and optimizing land use structure to achieve coordinated ecological protection and socioeconomic development in the subtropical hilly regions of southern China. 展开更多
关键词 Land use change Ecosystem services Contribution degree Trade-offs and Synergies Subtropical hilly region
原文传递
A Privacy-Preserving Scheme for Location-Based Services in the Internet of Vehicles 被引量:2
19
作者 Jiaqi Huang Yi Qian Rose Qingyang Hu 《Journal of Communications and Information Networks》 EI CSCD 2021年第4期385-395,共11页
Ubiquitous information exchange is achieved among connected vehicles through the increasingly smart environment.The concept of conventional vehicular ad hoc network is gradually transformed into the Internet of vehicl... Ubiquitous information exchange is achieved among connected vehicles through the increasingly smart environment.The concept of conventional vehicular ad hoc network is gradually transformed into the Internet of vehicles(IoV).Meanwhile,more and more locationbased services(LBSs)are created to provide convenience for drivers.However,the frequently updated location information sent to the LBS server also puts user location privacy at risk.Thus,preserve user location privacy while allowing vehicles to have high-quality LBSs is a critical issue.Many solutions have been proposed in the literature to preserve location privacy.However,most of them cannot provide real-time LBS with accurate location updates.In this paper,we propose a novel location privacy-preserving scheme,which allows vehicles to send accurate real-time location information to the LBS server while preventing being tracked by attackers.In the proposed scheme,a vehicle utilizes the location information of selected shadow vehicles,whose route diverge from the requester,to generate multiple virtual trajectories to the LBS server so as to mislead attackers.Simulation results show that our proposed scheme achieves a high privacy-preserving level and outperforms other state-of-the-art schemes in terms of location entropy and tracking success ratio. 展开更多
关键词 location privacy location-based service internet of vehicles vehicular networks
原文传递
A privacy-enhancing scheme against contextual knowledge-based attacks in location-based services 被引量:1
20
作者 Jiaxun HUA Yu LIU +3 位作者 Yibin SHEN Xiuxia TIAN Yifeng LUO Cheqing JIN 《Frontiers of Computer Science》 SCIE EI CSCD 2020年第3期225-227,共3页
1 Introduction and main contributions Location-based services are springing up around us,while leakages of users'privacy are inevitable during services.Even worse,adversaries may analyze intercepted service data,a... 1 Introduction and main contributions Location-based services are springing up around us,while leakages of users'privacy are inevitable during services.Even worse,adversaries may analyze intercepted service data,and extract more privacy like health and property.Therefore,privacy preservation is an indispensable guarantee on LBS security.Among the previous approaches to privacy preservation,k-anonymity-based ones have drawn much research attention[1-3].However,some privacy concern will be aroused if these schemes are adopted directly.For instance,Ut issues a query"Find the nearest hotel around me"in such an area as Fig.1(privacy profile k=4).DLS algorithm[2]constructs anonymity set A because these four cells have similar probabilities of being queried in the past.However,experienced adversaries can exclude some cells if they have learned rich contextual knowledge(side information)from historical data,such as features of each cell and LBS users. 展开更多
关键词 LBS services knowledge
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部