Have a personal or library account? Click to login
Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix Cover

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix

By: Chen Wen  
Open Access
|Jul 2015

References

  1. 1. Gruteser, M., D. Grunwald. Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. - In: Proc. of 1st International Conference on Mobile Systems, Applications and Services. ACM, 2003, pp. 31-42.10.1145/1066116.1189037
  2. 2. Xiao-Feng, H. U. O. Z. M. A Survey of Trajectory Privacy-Preserving Techniques. - Chinese Journal of Computers, Vol. 10, 2011.
  3. 3. Huo, Z., X. Meng, H. Hu, et al. You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection. - In: Proc. of Database Systems for Advanced Applications.Springer Berlin Heidelberg, 2012, pp. 351-366.
  4. 4. You, T. H., W. C. Peng, W. C. Lee. Protecting Moving Trajectories with Dummies. - In: Proc. of Mobile Data Management, 2007 International Conference on. IEEE, 2007, pp. 278-282.10.1109/MDM.2007.58
  5. 5. Terrovitis, M., N. Mamoulis. Privacy Preservation in the Publication of Trajectories. - In: Proc. of Mobile Data Management. (MDM’08) 9th International Conference on IEEE, 2008, pp. 65-72.10.1109/MDM.2008.29
  6. 6. Abul, O., F. Bonchi, M. Nanni. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases. - In: Proc. of Data Engineering (ICDE’2008) IEEE 24th International Conference on IEEE, 2008, pp. 376-385.
  7. 7. Nergiz, M. E., M. Atzori, Y. Saygin. Towards Trajectory Anonymization: A Generalization-Based Approach. - In: Proc. of SIGSPATIAL ACM GIS’2008 International Workshop on Security and Privacy in GIS and LBS. ACM, 2008, pp. 52-61.
  8. 8. Yarovoy, R., F. Bonchi, L. V. S. Lakshmanan et al. Anonymizing Moving Objects: How to Hide a MOB in a Crowd? - In: Proc. of 12th International Conference on Extending Database Technology: Advances in Database Technology. ACM, 2009, pp. 72-83.
  9. 9. Sadilek, A., H. Kautz, J. P. Bigham. Finding Your Friends and Following Them to Where You Are. - In: Proc. of 5th ACM International Conference on Web Search and Data Mining. ACM, 2012, pp. 723-732.10.1145/2124295.2124380
  10. 10. Freni, D., C. Ruiz Vicente, S. Mascetti et al. Preserving Location and Absence Privacy in Geo-Social Networks. - In: Proc. of 19th ACM International Conference on Information and Knowledge Management, ACM, 2010, pp. 309-318.10.1145/1871437.1871480
  11. 11. Mascetti, S., D. Freni, C. Bettini et al. Privacy in Geo-Social Networks: Proximity Notification with Untrusted Service Providers and Curious Buddies. - The VLDB Journal - The International Journal on Very Large Data Bases, Vol. 20, 2011, No 4, pp. 541-566.10.1007/s00778-010-0213-7
  12. 12. Mascetti, S., C. Bettini, D. Freni et al. Privacy-Aware Proximity Based Services. - In: Proc. of Mobile Data Management: Systems, Services and Middleware, 2009. MDM'09.Tenth International Conference on IEEE, 2009, pp. 31-40.
  13. 13. Huo, Z, X. F. Meng, Y. Huang. PrivateCheckIn: Trajectory Privacy-Preserving for Check-in Services in MSNS. - Jisuanji Xuebao, Chinese Journal of Computers, Vol. 36, 2013, No 4, pp. 716-726.10.3724/SP.J.1016.2013.00716
  14. 14. Cho, E, S. A. Myers, J. Leskovec. Friendship and Mobility: User Movement in Location- Based Social Networks. - In: Proc. of 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 2011, pp. 1082-1090.
DOI: https://doi.org/10.1515/cait-2015-0032 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 111 - 118
Published on: Jul 3, 2015
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2015 Chen Wen, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.