Tefera et al., 2019 - Google Patents
A game-theoretic framework to preserve location information privacy in location-based service applicationsTefera et al., 2019
View HTML- Document ID
- 15921659326216126037
- Author
- Tefera M
- Yang X
- Publication year
- Publication venue
- Sensors
External Links
Snippet
Recently, the growing ubiquity of location-based service (LBS) technology has increased the likelihood of users' privacy breaches due to the exposure of their real-life information to untrusted third parties. Extensive use of such LBS applications allows untrusted third-party …
- 238000000034 method 0 abstract description 30
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/02—Marketing, e.g. market research and analysis, surveying, promotions, advertising, buyer profiling, customer management or rewards; Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yamin et al. | An innovative method for preserving privacy in Internet of Things | |
Qiu et al. | A novel location privacy-preserving approach based on blockchain | |
Georgiadou et al. | Location Privacy in the Wake of the GDPR | |
Xu et al. | A location privacy preservation method based on dummy locations in Internet of vehicles | |
Alshammari et al. | Integrating a high-reliability multicriteria trust evaluation model with task role-based access control for cloud services | |
Kounadi et al. | Privacy threats and protection recommendations for the use of geosocial network data in research | |
Alrahhal et al. | A symbiotic relationship based leader approach for privacy protection in location based services | |
Tefera et al. | A game-theoretic framework to preserve location information privacy in location-based service applications | |
Bahbouh et al. | Tokens shuffling approach for privacy, security, and reliability in IoHT under a pandemic | |
Zhang et al. | A survey of dummy-based location privacy protection techniques for location-based services | |
Cui et al. | Cache-based privacy preserving solution for location and content protection in location-based services | |
Li et al. | A privacy measurement framework for multiple online social networks against social identity linkage | |
Huang et al. | A vehicle trajectory privacy preservation method based on caching and dummy locations in the internet of vehicles | |
Sampaio et al. | Collecting, processing and secondary using personal and (pseudo) anonymized data in smart cities | |
Zhao et al. | Privacy-enhanced federated learning: a restrictively self-sampled and data-perturbed local differential privacy method | |
Zhang et al. | Successive trajectory privacy protection with semantics prediction differential privacy | |
Alkanjr et al. | Location privacy-preserving scheme in iobt networks using deception-based techniques | |
Wang et al. | Game analysis of access control based on user behavior trust | |
Wainakh et al. | Federated learning attacks revisited: A critical discussion of gaps, assumptions, and evaluation setups | |
Alrayes et al. | Towards understanding location privacy awareness on geo-social networks | |
Fan et al. | Lightweight NFC protocol for privacy protection in mobile IoT | |
Du et al. | An efficient dummy-based location privacy-preserving scheme for internet of things services | |
Wang et al. | Context sensing system analysis for privacy preservation based on game theory | |
Kim et al. | Differentially private and skew-aware spatial decompositions for mobile crowdsensing | |
Kambourakis et al. | Security and Privacy in Wireless and Mobile Networks |