메뉴 건너뛰기




Volumn , Issue , 2012, Pages 301-312

Authenticating location-based services without compromising location privacy

Author keywords

lbs; privacy preserving; query authentication

Indexed keywords

AUTHENTICATION SCHEME; COST MODELS; LBS; LOCATION BASED; LOCATION PRIVACY; NETWORKING SERVICES; OPTIMIZATION TECHNIQUES; PRIVACY PRESERVING; RANGE QUERY; RELIABILITY AND ROBUSTNESS; SECURITY ANALYSIS; SERVICE PROVIDER; USER LOCATION;

EID: 84862698613     PISSN: 07308078     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2213836.2213871     Document Type: Conference Paper
Times cited : (58)

References (28)
  • 1
    • 57349191501 scopus 로고    scopus 로고
    • Supporting anonymous location queries in mobile environments with privacygrid
    • B. Bamba, L. Liu, P. Pesti, and T. Wang. Supporting anonymous location queries in mobile environments with privacygrid. In Proc. WWW, 2008.
    • Proc. WWW, 2008
    • Bamba, B.1    Liu, L.2    Pesti, P.3    Wang, T.4
  • 2
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Perv. Computing, 2(1), 2003.
    • (2003) IEEE Perv. Computing , vol.2 , Issue.1
    • Beresford, A.1    Stajano, F.2
  • 3
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • D. Boneh, C. Gentry, H. Shacham, and B. Lynn. Aggregate and verifiably encrypted signatures from bilinear maps. In EUROCRPYT, pages 416-432, 2003.
    • (2003) EUROCRPYT , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Shacham, H.3    Lynn, B.4
  • 4
    • 67649485810 scopus 로고    scopus 로고
    • Authenticating knn query results in data publishing
    • W. Cheng and K. Tan. Authenticating knn query results in data publishing. In SDM, 2007.
    • (2007) SDM
    • Cheng, W.1    Tan, K.2
  • 5
    • 62749198172 scopus 로고    scopus 로고
    • Query assurance verification for outsourced multi-dimensional databases
    • W. Cheng and K. Tan. Query assurance verification for outsourced multi-dimensional databases. Journal of Computer Security, 2009.
    • (2009) Journal of Computer Security
    • Cheng, W.1    Tan, K.2
  • 6
    • 84862637019 scopus 로고    scopus 로고
    • Casper*: Query processing for location services without compromising privacy
    • C. Chow, M. Mokbel, and W. Aref. Casper*: Query processing for location services without compromising privacy. ACM TODS, 2009.
    • (2009) ACM TODS
    • Chow, C.1    Mokbel, M.2    Aref, W.3
  • 7
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-anonymity: Architecture and algorithms
    • B. Gedik and L. Liu. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE TMC, 7(1):1-18, 2008.
    • (2008) IEEE TMC , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 8
    • 57149129292 scopus 로고    scopus 로고
    • Private queries in location based services: Anonymizers are not necessary
    • G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. Tan. Private queries in location based services: Anonymizers are not necessary. In SIGMOD, 2008.
    • (2008) SIGMOD
    • Ghinita, G.1    Kalnis, P.2    Khoshgozaran, A.3    Shahabi, C.4    Tan, K.5
  • 10
    • 77955179024 scopus 로고    scopus 로고
    • Privacyaware location data publishing
    • H. Hu, J. Xu, S. T. On, J. Du, and K. Ng. Privacyaware location data publishing. TODS, 35(3), 2010.
    • (2010) TODS , vol.35 , Issue.3
    • Hu, H.1    Xu, J.2    On, S.T.3    Du, J.4    Ng, K.5
  • 11
    • 79957834847 scopus 로고    scopus 로고
    • Processing private queries over untrusted data cloud through privacy homomorphism
    • H. Hu, J. Xu, C. Ren, and B. Choi. Processing private queries over untrusted data cloud through privacy homomorphism. In Proc. of ICDE, 2011.
    • Proc. of ICDE, 2011
    • Hu, H.1    Xu, J.2    Ren, C.3    Choi, B.4
  • 12
    • 35648982949 scopus 로고    scopus 로고
    • Preventing location-based identity inference in anonymous spatial queries
    • P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. TKDE, 19(12):1719-1733, 2007.
    • (2007) TKDE , vol.19 , Issue.12 , pp. 1719-1733
    • Kalnis, P.1    Ghinita, G.2    Mouratidis, K.3    Papadias, D.4
  • 13
    • 78651408225 scopus 로고    scopus 로고
    • Authenticated index structures for aggregation queries
    • F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Authenticated index structures for aggregation queries. ACM TISSEC, 13(32):1-35, 2010.
    • (2010) ACM TISSEC , vol.13 , Issue.32 , pp. 1-35
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 14
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • F. Li, G. Kollios, and L. Reyzin. Dynamic authenticated index structures for outsourced databases. In Proc. SIGMOD, pages 121-132, 2006.
    • (2006) Proc. SIGMOD , pp. 121-132
    • Li, F.1    Kollios, G.2    Reyzin, L.3
  • 15
    • 85011031975 scopus 로고    scopus 로고
    • Proof-infused streams: Enabling authentication of sliding window queries on streams
    • F. Li, K. Yi, M. Hadjieleftheriou, and G. Kollios. Proof-infused streams: Enabling authentication of sliding window queries on streams. In VLDB, 2007.
    • (2007) VLDB
    • Li, F.1    Yi, K.2    Hadjieleftheriou, M.3    Kollios, G.4
  • 16
    • 0001263548 scopus 로고
    • A certified digital signature
    • R. C. Merkle. A certified digital signature. In Proc. Crypto, pages 218-238, 1989.
    • (1989) Proc. Crypto , pp. 218-238
    • Merkle, R.C.1
  • 17
    • 29844457793 scopus 로고    scopus 로고
    • Verifying completeness of relational query results in data publishing
    • H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying completeness of relational query results in data publishing. In SIGMOD, pages 407-418, 2005.
    • (2005) SIGMOD , pp. 407-418
    • Pang, H.1    Jain, A.2    Ramamritham, K.3    Tan, K.-L.4
  • 18
    • 76849102606 scopus 로고    scopus 로고
    • Authenticating the query results of text search engines
    • H. Pang and K. Mouratidis. Authenticating the query results of text search engines. In VLDB, 2008.
    • (2008) VLDB
    • Pang, H.1    Mouratidis, K.2
  • 19
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating query results in edge computing
    • H. Pang and K.-L. Tan. Authenticating query results in edge computing. In Proc. ICDE, 2004.
    • Proc. ICDE, 2004
    • Pang, H.1    Tan, K.-L.2
  • 20
    • 79955911586 scopus 로고    scopus 로고
    • Nearest neighbor search with strong location privacy
    • S. Papadopoulos, S. Bakiras, and D. Papadias. Nearest neighbor search with strong location privacy. In VLDB, 2010.
    • (2010) VLDB
    • Papadopoulos, S.1    Bakiras, S.2    Papadias, D.3
  • 22
    • 33747610636 scopus 로고    scopus 로고
    • Efficient cost models for spatial queries using r-trees
    • Y. Theodoridis, E. Stefanakis, and T. Sellis. Efficient cost models for spatial queries using r-trees. TKDE, 12(1):19-32, 2000.
    • (2000) TKDE , vol.12 , Issue.1 , pp. 19-32
    • Theodoridis, Y.1    Stefanakis, E.2    Sellis, T.3
  • 24
    • 51349083760 scopus 로고    scopus 로고
    • Exploring historical location data for anonymity preservation in location-based services
    • Phoenix, Arizona
    • T. Xu and Y. Cai. Exploring historical location data for anonymity preservation in location-based services. In IEEE Infocom, Phoenix, Arizona, 2008.
    • (2008) IEEE Infocom
    • Xu, T.1    Cai, Y.2
  • 25
    • 67650394655 scopus 로고    scopus 로고
    • Location cloaking for safety protection of ad hoc networks
    • T. Xu and Y. Cai. Location cloaking for safety protection of ad hoc networks. In IEEE Infocom, 2009.
    • (2009) IEEE Infocom
    • Xu, T.1    Cai, Y.2
  • 27
    • 67649510426 scopus 로고    scopus 로고
    • Authenticated indexing for outsourced spatial databases
    • Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Authenticated indexing for outsourced spatial databases. The VLDB Journal, 18(3):631-648, 2009.
    • (2009) The VLDB Journal , vol.18 , Issue.3 , pp. 631-648
    • Yang, Y.1    Papadopoulos, S.2    Papadias, D.3    Kollios, G.4
  • 28
    • 79957874657 scopus 로고    scopus 로고
    • Authentication of moving knn queries
    • M. L. Yiu, E. Lo, and D. Yung. Authentication of moving knn queries. In Proc. ICDE, pages 565-576, 2011.
    • (2011) Proc. ICDE , pp. 565-576
    • Yiu, M.L.1    Lo, E.2    Yung, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.