KUR-algorithm: From position to trajectory privacy protection in location-based applications

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Some obfuscation techniques may fail to protect user privacy because of the moving context as well as the background knowledge of adversaries. In this paper, we propose a novel scheme to distinctly protect user privacy not only from user position but also from user trajectory. Furthermore, we present kURalgorithm, which is context-aware and can be employed as either an independent method or a supportive technique, to give the high-level user privacy protection against privacy disclosure and privacy leak. Last but not least, we analyse other potential privacy problems which usually emerge as outliers and show how well our proposed solution overcomes these scenarios.

Cite

CITATION STYLE

APA

Phan, T. N., Kung, J., & Dang, T. K. (2015). KUR-algorithm: From position to trajectory privacy protection in location-based applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9262, pp. 82–89). Springer Verlag. https://doi.org/10.1007/978-3-319-22852-5_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free