메뉴 건너뛰기




Volumn 33, Issue 4, 2017, Pages 965-978

Privacy protection model based on digital envelope and dummies for location-based services

Author keywords

Digital envelope; Dummies; Location based services; Privacy; Smart city

Indexed keywords

AUTOMOBILE DRIVER SIMULATORS; DATA PRIVACY; LOCATION; SMART CITY; TELECOMMUNICATION SERVICES;

EID: 85049883679     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: 10.6688/JISE.2017.33.4.7     Document Type: Article
Times cited : (4)

References (22)
  • 1
    • 84954179437 scopus 로고    scopus 로고
    • Parallel transportation management control system and its applications in building smart cities
    • F. H. Zhou, Z. J. Li, S. H. Chen, and G. Xiong, “Parallel transportation management control system and its applications in building smart cities,” IEEE Transactions on Intelligent Transportation Systems, Vol. 17, 2016, pp. 1576-1585.
    • (2016) IEEE Transactions on Intelligent Transportation Systems , vol.17 , pp. 1576-1585
    • Zhou, F.H.1    Li, Z.J.2    Chen, S.H.3    Xiong, G.4
  • 2
    • 84939146196 scopus 로고    scopus 로고
    • Data stream visualization framework for smart cities
    • F. J. Villanueva, C. Aguirre, A. Rubio, D. Villa, et al., “Data stream visualization framework for smart cities,” Soft Computing, Vol. 20, 2016, pp. 1671-1681.
    • (2016) Soft Computing , vol.20 , pp. 1671-1681
    • Villanueva, F.J.1    Aguirre, C.2    Rubio, A.3    Villa, D.4
  • 4
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing
    • Z. J. Fu, X. M. Sun, Q. Liu, L. Zhou, and J. G. Shu, “Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Transactions on Communications, Vol. E98-B, 2015, pp. 190-200.
    • (2015) IEICE Transactions on Communications , vol.E98-B , pp. 190-200
    • Fu, Z.J.1    Sun, X.M.2    Liu, Q.3    Zhou, L.4    Shu, J.G.5
  • 5
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Y. J. Ren, J. Shen, J. Wang, J. Han, and S. Y. Lee, “Mutual verifiable provable data auditing in public cloud storage,” Journal of Internet Technology, Vol. 16, 2015, pp. 317-323.
    • (2015) Journal of Internet Technology , vol.16 , pp. 317-323
    • Ren, Y.J.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.Y.5
  • 6
    • 84963856290 scopus 로고    scopus 로고
    • Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
    • Z. Liu, H. Seo, J. Großschädl, and H. Kim, “Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes,” IEEE Transactions on Information Forensics and Security, Vol. 11, 2016, pp. 1385-1397.
    • (2016) IEEE Transactions on Information Forensics and Security , vol.11 , pp. 1385-1397
    • Liu, Z.1    Seo, H.2    Großschädl, J.3    Kim, H.4
  • 8
    • 84954105655 scopus 로고    scopus 로고
    • Traffic assignment using a density-based travel-time function for intelligent transportation systems
    • P. Kachroo and S. Sastry, “Traffic assignment using a density-based travel-time function for intelligent transportation systems,” IEEE Transactions on Intelligent Trans-poration Systems, Vol. 17, 2016, pp. 1438-1447.
    • (2016) IEEE Transactions on Intelligent Trans-Poration Systems , vol.17 , pp. 1438-1447
    • Kachroo, P.1    Sastry, S.2
  • 9
    • 84908108412 scopus 로고    scopus 로고
    • A performance evaluation of an efficient traffic congestion detection protocol (ECODE) for intelligent transportation systems
    • M. B. Younes and A. Boukerche, “A performance evaluation of an efficient traffic congestion detection protocol (ECODE) for intelligent transportation systems,” Ad Hoc Networks, Vol. 24, 2015, pp. 317-336.
    • (2015) Ad Hoc Networks , vol.24 , pp. 317-336
    • Younes, M.B.1    Boukerche, A.2
  • 10
    • 84961379040 scopus 로고    scopus 로고
    • Privacy-protected communication for location-based services
    • M. Werner, “Privacy-protected communication for location-based services,” Security and Communicaton Networks, Vol. 9, 2016, pp. 130-138.
    • (2016) Security and Communicaton Networks , vol.9 , pp. 130-138
    • Werner, M.1
  • 11
    • 84961194736 scopus 로고    scopus 로고
    • Reverse keyword search for spatio-textual top-k queries in location-based Services
    • X. Lin, J. L. Xu, and H. B. Hu, “Reverse keyword search for spatio-textual top-k queries in location-based Services,” IEEE Transactions on Knowledge and Data Engineering, Vol. 27, 2015, pp. 3056-3069.
    • (2015) IEEE Transactions on Knowledge and Data Engineering , vol.27 , pp. 3056-3069
    • Lin, X.1    Xu, J.L.2    Hu, H.B.3
  • 12
    • 80054886190 scopus 로고    scopus 로고
    • Capturing location-privacy preferences: Quantifying accuracy and user-burden tradeoffs
    • M. Benisch, P. G. Kelley, N. Sadeh, and L. F. Cranor, “Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs,” Personal and Ubiqui-tious Computing, Vol. 15, 2011, pp. 679-694.
    • (2011) Personal and Ubiqui-Tious Computing , vol.15 , pp. 679-694
    • Benisch, M.1    Kelley, P.G.2    Sadeh, N.3    Cranor, L.F.4
  • 14
    • 84875260168 scopus 로고    scopus 로고
    • Mobile social networking applications
    • N. Jabeur, S. Zeadally, and B. Sayed, “Mobile social networking applications,” Communications of ACM, Vol. 56, 2013, pp. 71-79.
    • (2013) Communications of ACM , vol.56 , pp. 71-79
    • Jabeur, N.1    Zeadally, S.2    Sayed, B.3
  • 16
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. R. Beresford and F. Stajano, “Location privacy in pervasive computing,” IEEE Pervasive Computing, Vol. 2, 2003, pp. 46-55.
    • (2003) IEEE Pervasive Computing , vol.2 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 17
    • 77951602707 scopus 로고    scopus 로고
    • Private queries and trajectory anonymization: A dual perspective on location privacy
    • G. Ghinita, “Private queries and trajectory anonymization: A dual perspective on location privacy,” Transactions on Data Privacy, Vol. 2, 2009, pp. 3-19.
    • (2009) Transactions on Data Privacy , vol.2 , pp. 3-19
    • Ghinita, G.1
  • 18
    • 67650320950 scopus 로고    scopus 로고
    • A survey of computational location privacy
    • J. Krumm, “A survey of computational location privacy,” Personal and Ubiquiitous Computing, Vol. 13, 2009, pp. 391-399.
    • (2009) Personal and Ubiquiitous Computing , vol.13 , pp. 391-399
    • Krumm, J.1
  • 19
    • 81055157269 scopus 로고    scopus 로고
    • A survey of trajectory privacy preserving techniques
    • Z. Huo and X. F. Meng, “A survey of trajectory privacy preserving techniques,” Chinese Journal of Computers, Vol. 34, 2011, pp. 1820-1830.
    • (2011) Chinese Journal of Computers , vol.34 , pp. 1820-1830
    • Huo, Z.1    Meng, X.F.2
  • 20
    • 84863294412 scopus 로고    scopus 로고
    • Privacy protection for users of location-b ased services
    • K. G. Shin, X. E. Ju, and Z. G. Chen, “Privacy protection for users of location-b ased services,” IEEE Wireless Communications, Vol. 19, 2012, pp. 30-39.
    • (2012) IEEE Wireless Communications , vol.19 , pp. 30-39
    • Shin, K.G.1    Ju, X.E.2    Chen, Z.G.3
  • 22
    • 81055157253 scopus 로고    scopus 로고
    • Coprivacy: A collaborative location priv acy-preserving method without cloaking region
    • Y. Huang, Z. Huo, and X. F. Meng, “Coprivacy: A collaborative location priv acy-preserving method without cloaking region,” Chinese Journal of Computers, Vo l. 10, 2011, pp. 1976-1985.
    • (2011) Chinese Journal of Computers , vol.10 , pp. 1976-1985
    • Huang, Y.1    Huo, Z.2    Meng, X.F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.