JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2017, Vol. 52 ›› Issue (5): 75-84.doi: 10.6040/j.issn.1671-9352.2.2016.203
Previous Articles Next Articles
BI Xiao-di1,2, LIANG Ying1, SHI Hong-zhou1, TIAN Hui3
CLC Number:
[1] 张学军, 桂小林, 伍忠东. 位置服务隐私保护研究综述[J]. 软件学报, 2015(9):2373-2395. ZHANG Xuejun, GUI Xiaolin, WU Zhongdong. Privacy preservation for location—based services: a survey[J]. Journal of Software, 2015, 26(9):2373-2395. [2] GAMBS S, KILLIJIAN M, NUÑEZ D. Show me how you move and I will tell you who you are[J]. Transactions on Data Privacy, 2010, 4(2):34-41. [3] 王璐, 孟小峰. 位置大数据隐私保护研究综述[J]. 软件学报, 2014, 25(4):693-712. WANG Lu, MENG Xiaofeng. Location privacy preservation in big data era: a survey[J]. Journal of Software, 2014, 25(4):693-712. [4] 潘晓, 肖珍, 孟小峰. 位置隐私研究综述[J]. 计算机科学与探索, 2007, 1(3):268-281. PAN Xiao, XIAO Zhen, MENG Xiaofeng. Survey of location privacy-preserving[J]. Journal of Computer Science and Frontiers, 2007, 1(3):268-281. [5] FAWAZ K, SHIN K. Location privacy protection for smartphone users[C] // Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2014: 239-250. [6] KOSTAS Chatzikokolakis. Location-guard[EB/OL].[2016-07-01.] https://github.com/chatziko/location-guard. [7] SWEENEY L. k-anonymity: a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(05):557-570. [8] GRUTESER M, GRUNWALD D. Anonymous usage of location-based services through spatial and temporal cloaking[C] // Proceedings of the 1st international conference on Mobile systems, applications and services. New York: ACM, 2003: 31-42. [9] GEDIK B, LIU L. Protecting location privacy with personalized k-anonymity: Architecture and algorithms[J]. Mobile Computing, IEEE Transactions on, 2008, 7(1):1-18. [10] 朱麟, 黄胜波. 不确定环境下轨迹k-匿名隐私保护[J]. 计算机应用, 2015, 35(12):3437-3441. ZHU Lin, HUANG Shengbo. k-anonymity privacy—preserving for trajectory in uncertain environment[J]. Journal of Computer Applications, 2015, 35(12):3437-3441. [11] DWORK C. Differential privacy[M] // Automata, languages and programming. Berlin: Springer, 2006: 1-12. [12] DWORK C, MCSHERRY F, NISSIM K, et al. Calibrating noise to sensitivity in private data analysis[M] // Theory of cryptography. Berlin: Springer, 2006: 265-284. [13] MCSHERRY F, TALWAR K. Mechanism design via differential privacy[C] // Foundations of Computer Science, 2007. FOCS'07. 54th Annual IEEE Symposium on. 2007: 94-103. DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/FOCS.2007.66 [14] ANDRÉS M, BORDENABEN, CHATZIKOKOLAKIS K, et al. Geo-indistinguishability: Differential privacy for location-based systems[C] // Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York: ACM, 2013: 901-914. [15] DEWRI R. Local differential perturbations: location privacy under approximate knowledge attackers[J]. Mobile Computing, IEEE Transactions on, 2013, 12(12):2360-2372. [16] 倪巍伟,陈萧. 保护位置隐私近邻查询中隐私偏好问题研究[J].软件学报,2016. NI Weiwei, CHEN Xiao. User privacy preference support in location privacy-preserving nearest neighbor query. Ruan[J]. Journal of Software, 2016, 27(7):1805-1821. [17] 康海燕, 杨孔雨, 陈建明. 基于K-匿名的个性化隐私保护方法研究[J]. 山东大学学报(理学版), 2014, 49(9):142-149. KANG Haiyan, YANG Kongyu, CHEN Jianming. A method of personalized privacy preservation based on K-anonymization[J]. Journal of Shandong University(Natural Science), 2014, 49(9):142-149. [18] SHOKRI R, TRONCOSO C, DIAZ C, et al. Unraveling an old cloak: k-anonymity for location privacy[C] // Proceedings of the 9th annual ACM workshop on Privacy in the electronic society. New York: ACM, 2010: 115-118. [19] ZHENG Y, LI Q, CHEN Y, et al. Understanding mobility based on GPS data[C] // Proceedings of the 10th international conference on Ubiquitous computing. New York: ACM, 2008: 312-321. [20] ZHENG Y, ZHANG L, XIE X, et al. Mining interesting locations and travel sequences from GPS trajectories[C] // Proceedings of the 18th international conference on World wide web. New York: ACM, 2009: 791-800. |
[1] | YAN Yan, HAO Xiao-hong. Differential privacy partitioning algorithm based on adaptive density grids [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 12-22. |
[2] | KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23. |
|