[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Tefera et al., 2019 - Google Patents

A game-theoretic framework to preserve location information privacy in location-based service applications

Tefera et al., 2019

View HTML
Document ID
15921659326216126037
Author
Tefera M
Yang X
Publication year
Publication venue
Sensors

External Links

Snippet

Recently, the growing ubiquity of location-based service (LBS) technology has increased the likelihood of users' privacy breaches due to the exposure of their real-life information to untrusted third parties. Extensive use of such LBS applications allows untrusted third-party …
Continue reading at www.mdpi.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/02Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Yamin et al. An innovative method for preserving privacy in Internet of Things
Qiu et al. A novel location privacy-preserving approach based on blockchain
Georgiadou et al. Location Privacy in the Wake of the GDPR
Xu et al. A location privacy preservation method based on dummy locations in Internet of vehicles
Alshammari et al. Integrating a high-reliability multicriteria trust evaluation model with task role-based access control for cloud services
Kounadi et al. Privacy threats and protection recommendations for the use of geosocial network data in research
Alrahhal et al. A symbiotic relationship based leader approach for privacy protection in location based services
Tefera et al. A game-theoretic framework to preserve location information privacy in location-based service applications
Bahbouh et al. Tokens shuffling approach for privacy, security, and reliability in IoHT under a pandemic
Zhang et al. A survey of dummy-based location privacy protection techniques for location-based services
Cui et al. Cache-based privacy preserving solution for location and content protection in location-based services
Li et al. A privacy measurement framework for multiple online social networks against social identity linkage
Huang et al. A vehicle trajectory privacy preservation method based on caching and dummy locations in the internet of vehicles
Sampaio et al. Collecting, processing and secondary using personal and (pseudo) anonymized data in smart cities
Zhao et al. Privacy-enhanced federated learning: a restrictively self-sampled and data-perturbed local differential privacy method
Zhang et al. Successive trajectory privacy protection with semantics prediction differential privacy
Alkanjr et al. Location privacy-preserving scheme in iobt networks using deception-based techniques
Wang et al. Game analysis of access control based on user behavior trust
Wainakh et al. Federated learning attacks revisited: A critical discussion of gaps, assumptions, and evaluation setups
Alrayes et al. Towards understanding location privacy awareness on geo-social networks
Fan et al. Lightweight NFC protocol for privacy protection in mobile IoT
Du et al. An efficient dummy-based location privacy-preserving scheme for internet of things services
Wang et al. Context sensing system analysis for privacy preservation based on game theory
Kim et al. Differentially private and skew-aware spatial decompositions for mobile crowdsensing
Kambourakis et al. Security and Privacy in Wireless and Mobile Networks