메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 7692-7701

Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services

Author keywords

fog computing; LBS privacy; rotation; trajectory privacy preservation

Indexed keywords

CLOUD COMPUTING; DIGITAL STORAGE; DISTRIBUTED COMPUTER SYSTEMS; FOG; LOCATION; MOBILE CLOUD COMPUTING; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ARCHITECTURE; ROTATION; TELECOMMUNICATION SERVICES; TRAJECTORIES; TRUSTED COMPUTING;

EID: 85028358232     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2017.2698078     Document Type: Article
Times cited : (92)

References (36)
  • 1
    • 84988380596 scopus 로고    scopus 로고
    • Following targets for mobile tracking in wireless sensor networks
    • T. Wang et al., "Following targets for mobile tracking in wireless sensor networks, " ACM Trans. Sensor Netw., vol. 12, no. 4, p. 31, 2016.
    • (2016) ACM Trans. Sensor Netw , vol.12 , Issue.4 , pp. 31
    • Wang, T.1
  • 2
    • 84986631527 scopus 로고    scopus 로고
    • A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
    • Nov
    • Z. Xia, X. Wang, L. Zhang, X. Sun, K. Ren, and Z. Qin, "A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2594-2608, Nov. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.11 , pp. 2594-2608
    • Xia, Z.1    Wang, X.2    Zhang, L.3    Sun, X.4    Ren, K.5    Qin, Z.6
  • 3
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • Jan
    • Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Jan. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst , vol.27 , Issue.2 , pp. 340-352
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 4
    • 84995467231 scopus 로고    scopus 로고
    • Green routing pro-Tocols for wireless multimedia sensor networks
    • Dec
    • G. Han, J. Jiang, M. Guizani, and J. J. P. C. Rodrigues, "Green routing pro-Tocols for wireless multimedia sensor networks, " IEEEWireless Commun., vol. 23, no. 6, pp. 140-146, Dec. 2016.
    • (2016) IEEEWireless Commun , vol.23 , Issue.6 , pp. 140-146
    • Han, G.1    Jiang, J.2    Guizani, M.3    Rodrigues, J.J.P.C.4
  • 5
    • 84983268338 scopus 로고    scopus 로고
    • Towards ef-cient content-Aware search over encrypted outsourced data in cloud
    • Apr
    • Z. Fu, X. Sun, S. Ji, and G. Xie, "Towards ef-cient content-Aware search over encrypted outsourced data in cloud, " in Proc. IEEE INFOCOM Conf. Comput. Commun., Apr. 2016, pp. 1-9.
    • (2016) Proc IEEE INFOCOM Conf. Comput. Commun , pp. 1-9
    • Fu, Z.1    Sun, X.2    Ji, S.3    Xie, G.4
  • 6
    • 84991466851 scopus 로고    scopus 로고
    • Privcheck: Privacy-preserving check-in data publishing for personalized location based ser-vices
    • D. Yang, D. Zhang, B. Qu, and P. C. Mauroux, "Privcheck: Privacy-preserving check-in data publishing for personalized location based ser-vices, " in Proc. ACM Int. Joint Conf. Pervasive Ubiquitous Comput., 2016, pp. 545-556.
    • (2016) Proc ACM Int. Joint Conf. Pervasive Ubiquitous Comput , pp. 545-556
    • Yang, D.1    Zhang, D.2    Qu, B.3    Mauroux, P.C.4
  • 7
    • 85020954580 scopus 로고    scopus 로고
    • An incentive mechanism for k-Anonymity in LBS privacy protection based on credit mechanism
    • X. Li, M. Miao, H. Liu, J. Ma, and K. C. Li, "An incentive mechanism for k-Anonymity in LBS privacy protection based on credit mechanism, " in Proc. Soft Comput., 2016, pp. 1-11.
    • (2016) Proc. Soft Comput , pp. 1-11
    • Li, X.1    Miao, M.2    Liu, H.3    Ma, J.4    Li, K.C.5
  • 8
    • 85029707124 scopus 로고    scopus 로고
    • Dynamic adaptive replace-ment policy in shared last-level cache of dram/pcm hybrid memory for big data storage
    • to be published
    • G. Jia, G. Han, J. Jiang, and L. Liu, "Dynamic adaptive replace-ment policy in shared last-level cache of dram/pcm hybrid memory for big data storage, " IEEE Trans. Ind. Informat., to be published, doi: 10.1109/TII.2016.2645941.
    • IEEE Trans. Ind. Informat
    • Jia, G.1    Han, G.2    Jiang, J.3    Liu, L.4
  • 9
    • 84994236081 scopus 로고    scopus 로고
    • Collaborative trajectory pri-vacy preserving scheme in location-based services
    • May
    • T. Peng, Q. Liu, D. Meng, and G. Wang, "Collaborative trajectory pri-vacy preserving scheme in location-based services, " Inf. Sci., vol. 387, pp. 165-179, May 2017.
    • (2017) Inf. Sci , vol.387 , pp. 165-179
    • Peng, T.1    Liu, Q.2    Meng, D.3    Wang, G.4
  • 10
    • 84883061024 scopus 로고    scopus 로고
    • Dynamic mix-zone for location privacy in vehicular networks
    • Aug
    • B. Ying, D. Makrakis, and H. T. Mouftah, "Dynamic mix-zone for location privacy in vehicular networks, " IEEE Commun. Lett., vol. 17, no. 8, pp. 1524-1527, Aug. 2013.
    • (2013) IEEE Commun. Lett , vol.17 , Issue.8 , pp. 1524-1527
    • Ying, B.1    Makrakis, D.2    Mouftah, H.T.3
  • 11
    • 84930372896 scopus 로고    scopus 로고
    • Long-Term location privacy protection for location-based services in mobile cloud computing
    • F. Tang, J. Li, I. You, and M. Guo, "Long-Term location privacy protection for location-based services in mobile cloud computing, " Soft Comput., vol. 20, no. 5, pp. 1735-1747, 2016.
    • (2016) Soft Comput , vol.20 , Issue.5 , pp. 1735-1747
    • Tang, F.1    Li, J.2    You, I.3    Guo, M.4
  • 12
    • 85077359111 scopus 로고    scopus 로고
    • Enabling semantic search based on conceptual graphs over encrypted outsourced data
    • to be published
    • Z. Fu, F. Huang, X. Sun, A. Vasilakos, and C. N. Yang, "Enabling semantic search based on conceptual graphs over encrypted outsourced data, " IEEE Trans. Serv. Comput., to be published, doi: 10.1109/TSC.2016.2622697.
    • IEEE Trans. Serv. Comput
    • Fu, Z.1    Huang, F.2    Sun, X.3    Vasilakos, A.4    Yang, N.C.5
  • 13
    • 36549043405 scopus 로고    scopus 로고
    • Protecting location privacy with personalized k-Anonymity: Architecture and algorithms
    • Jan
    • B. Gedik and L. Liu, "Protecting location privacy with personalized k-Anonymity: Architecture and algorithms, " IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 1-18, Jan. 2008.
    • (2008) IEEE Trans. Mobile Comput , vol.7 , Issue.1 , pp. 1-18
    • Gedik, B.1    Liu, L.2
  • 14
    • 84943157127 scopus 로고    scopus 로고
    • Pseudonym-based anonymity zone generation for mobile service with strong adversary model
    • M. Guo, N. Pissinou, and S. S. Iyengar, "Pseudonym-based anonymity zone generation for mobile service with strong adversary model, " in Proc. Consum. Commun. Netw. Conf., 2015, pp. 335-340.
    • (2015) Proc. Consum. Commun. Netw. Conf , pp. 335-340
    • Guo, M.1    Pissinou, N.2    Iyengar, S.S.3
  • 16
    • 84912110181 scopus 로고    scopus 로고
    • Connected vehicles, the Internet of Things, and fog com-puting
    • Las Vegas, NV, USA
    • F. Bonomi, "Connected vehicles, the Internet of Things, and fog com-puting, " in Proc. 8th ACM Int. Workshop Veh. Inter-Netw. (VANET), Las Vegas, NV, USA, 2011, pp. 13-15.
    • (2011) Proc. 8th ACM Int. Workshop Veh. Inter-Netw. (VANET) , pp. 13-15
    • Bonomi, F.1
  • 17
    • 84996757871 scopus 로고    scopus 로고
    • Finding your way in the fog: Towards a comprehensive de-nition of fog computing
    • Oct
    • L. M. Vaquero and L. Rodero-Merino, "Finding your way in the fog: Towards a comprehensive de-nition of fog computing, " ACM SIGCOMM Comput. Commun. Rev., vol. 44, no. 5, pp. 27-32, Oct. 2014.
    • (2014) ACM SIGCOMM Comput. Commun. Rev , vol.44 , Issue.5 , pp. 27-32
    • Vaquero, L.M.1    Rodero-Merino, L.2
  • 21
    • 84958787166 scopus 로고    scopus 로고
    • An ef-cient virtual machine consol-idation scheme for multimedia cloud computing
    • G. Han, W. Que, G. Jia, and L. Shu, "An ef-cient virtual machine consol-idation scheme for multimedia cloud computing, " Sensors, vol. 16, no. 2, p. 246, 2016.
    • (2016) Sensors , vol.16 , Issue.2 , pp. 246
    • Han, G.1    Que, W.2    Jia, G.3    Shu, L.4
  • 22
    • 79952449865 scopus 로고    scopus 로고
    • Spatial cloaking for anonymous location-based services in mobile peer-To-peer environments
    • C.-Y. Chow, M. F. Mokbel, and X. Liu, "Spatial cloaking for anonymous location-based services in mobile peer-To-peer environments, " GeoInfor-matica, vol. 15, no. 2, pp. 351-380, 2011.
    • (2011) GeoInfor-matica , vol.15 , Issue.2 , pp. 351-380
    • Chow, C.-Y.1    Mokbel, M.F.2    Liu, X.3
  • 23
    • 84903180672 scopus 로고    scopus 로고
    • A novel time-obfuscated algorithm for trajectory privacy protection
    • Jun
    • R.-H. Hwang, Y.-L. Hsueh, and H.-W. Chung, "A novel time-obfuscated algorithm for trajectory privacy protection, " IEEE Trans. Serv. Comput., vol. 7, no. 2, pp. 126-139, Jun. 2014.
    • (2014) IEEE Trans. Serv. Comput , vol.7 , Issue.2 , pp. 126-139
    • Hwang, R.-H.1    Hsueh, Y.-L.2    Chung, H.-W.3
  • 24
    • 84922851833 scopus 로고    scopus 로고
    • Attack-resilient mix-zones over road networks: Architecture and algorithms
    • Mar
    • B. Palanisamy and L. Liu, "Attack-resilient mix-zones over road networks: Architecture and algorithms, " IEEE Trans. Mobile Comput., vol. 14, no. 3, pp. 495-508, Mar. 2015.
    • (2015) IEEE Trans. Mobile Comput , vol.14 , Issue.3 , pp. 495-508
    • Palanisamy, B.1    Liu, L.2
  • 25
    • 84866628169 scopus 로고    scopus 로고
    • Trajectory privacy in location-based services and data publication
    • Jun
    • C. Chow and M. F. Mokbel, "Trajectory privacy in location-based services and data publication, " ACM SIGKDD Explorations Newslett., vol. 13, no. 1, pp. 19-29, Jun. 2011.
    • (2011) ACM SIGKDD Explorations Newslett , vol.13 , Issue.1 , pp. 19-29
    • Chow, C.1    Mokbel, M.F.2
  • 26
    • 84936883899 scopus 로고    scopus 로고
    • A novel dummy-based mechanism to protect pri-vacy on trajectories
    • Dec
    • X. Wu and G. Sun, "A novel dummy-based mechanism to protect pri-vacy on trajectories, " in Proc. IEEE Int. Conf. Data Mining Workshop, Dec. 2014, pp. 1120-1125.
    • (2014) Proc IEEE Int. Conf. Data Mining Workshop , pp. 1120-1125
    • Wu, X.1    Sun, G.2
  • 28
    • 84864375403 scopus 로고    scopus 로고
    • A dual-Active spatial cloaking algorithm for location privacy preserving in mobile peer-To-peer networks
    • Apr
    • Y. Che, Q. Yang, and X. Hong, "A dual-Active spatial cloaking algorithm for location privacy preserving in mobile peer-To-peer networks, " in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Apr. 2012, pp. 2098-2102.
    • (2012) Proc IEEE Wireless Commun. Netw. Conf. (WCNC) , pp. 2098-2102
    • Che, Y.1    Yang, Q.2    Hong, X.3
  • 29
    • 84897644876 scopus 로고    scopus 로고
    • Balancing trajectory privacy and data utility using a personalized anonymization model
    • Feb
    • S. Gao, J. Ma, C. Sun, and X. Li, "Balancing trajectory privacy and data utility using a personalized anonymization model, " J. Netw. Comput. Appl., vol. 38, pp. 125-134, Feb. 2014.
    • (2014) J. Netw. Comput. Appl , vol.38 , pp. 125-134
    • Gao, S.1    Ma, J.2    Sun, C.3    Li, X.4
  • 30
    • 84978471363 scopus 로고    scopus 로고
    • Reliable wireless connections for fast-moving rail users based on a chained fog structure
    • Feb
    • T. Wang et al., "Reliable wireless connections for fast-moving rail users based on a chained fog structure, " Inf. Sci., vol. 379, pp. 160-176, Feb. 2017.
    • Inf. Sci , vol.379 , Issue.2017 , pp. 160-176
    • Wang, T.1
  • 31
    • 84961879980 scopus 로고    scopus 로고
    • On QoS-Aware scheduling of data stream applications over fog computing infrastruc-Tures
    • V. Cardellini, V. Grassi, F. L. Presti, and M. Nardelli, "On QoS-Aware scheduling of data stream applications over fog computing infrastruc-Tures, " in Proc. Comput. Commun., 2015, pp. 271-276.
    • (2015) Proc. Comput. Commun , pp. 271-276
    • Cardellini, V.1    Grassi, V.2    Presti, F.L.3    Nardelli, M.4
  • 33
    • 84979792270 scopus 로고    scopus 로고
    • Dummy-based user location anonymization under real-world constraints
    • T. Hara, A. Suzuki, M. Iwata, Y. Arase, and X. Xie, "Dummy-based user location anonymization under real-world constraints, " IEEE Access, vol. 4, pp. 673-687, 2016.
    • (2016) IEEE Access , vol.4 , pp. 673-687
    • Hara, T.1    Suzuki, A.2    Iwata, M.3    Arase, Y.4    Xie, X.5
  • 34
    • 84899106645 scopus 로고    scopus 로고
    • Septic shock prediction for patients with missing data
    • J. C. Ho, C. H. Lee, and J. Ghosh, "Septic shock prediction for patients with missing data, " ACM Trans. Manage. Inf. Syst. (TMIS), vol. 5, no. 1, p. 1, 2014.
    • (2014) ACM Trans. Manage. Inf. Syst. (TMIS) , vol.5 , Issue.1 , pp. 1
    • Ho, J.C.1    Lee, C.H.2    Ghosh, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.