Efficient location privacy algorithm for Internet of Things (IoT) services and applications
Tài liệu tham khảo
Appavoo, P., Chan M., Bhojan A., et al., 2016. Efficient and privacy-preserving access to sensor data for Internet of Things (IoT) based services. In: Proceedings of the IEEE International Conference on Communication Systems and Networks, pp. 1–8.
Aryan A., Singh S., 2010. Protecting location privacy in Augmented Reality using k-anonymization and pseudo-id. In: Proceedings of the International Conference on Computer and Communication Technology, pp. 119–124.
Beresford, 2003, Location privacy in pervasive computing, IEEE Pervasive Comput., 2, 46, 10.1109/MPRV.2003.1186725
Bethencourt, 2007, Ciphertext-policy attribute based encryption, IEEE Symp. Secur. Priv., 321
Perera C., McCormick C., Bandara A., et al., 2016. Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms. arXiv preprint arXiv, 1609.04060.
Caron, 2016, The Internet of Things (IoT) and its impact on individual privacy: an Australian perspective, Comput. Law Secur. Rev., 32, 4, 10.1016/j.clsr.2015.12.001
Chang, 2016, Towards achieving Data Security with the Cloud Computing Adoption Framework, IEEE Trans. Serv. Comput., 9, 138, 10.1109/TSC.2015.2491281
Chang, 2016, Cloud computing adoption framework: a security framework for business clouds, Future Gener. Comput. Syst., 57, 24, 10.1016/j.future.2015.09.031
Chow, 2006, A peer-to-peer spatial cloaking algorithm for anonymous location-based service, ACM Adv. Geogr. Inf. Syst., 171
Chow, 2009, Casper: query processing for location services without compromising privacy, ACM Trans. Database Syst., 34, 24, 10.1145/1620585.1620591
Gedik, 2008, Protecting location privacy with personalized k-Anonymity: architecture and algorithms, IEEE Trans. Mob. Comput. (TMC), 7, 1, 10.1109/TMC.2007.1062
González-Manzano, 2016, PAgIoT-Privacy-preserving aggregation protocol for Internet of Things, J. Netw. Comput. Appl., 71, 59, 10.1016/j.jnca.2016.06.001
Ngo, H., Kim, J., 2015. Location privacy via differential private perturbation of cloaking area. In: Proceedings of the IEEE 28th Computer Security Foundations Symposium, pp. 63–74.
Henze, 2016, A comprehensive approach to privacy in the cloud-based Internet of Things, Future Gener. Comput. Syst., 56, 701, 10.1016/j.future.2015.09.016
Hossain, A., Jang, S., Chang J., 2012. Privacy-aware cloaking technique in location-based services. In: Proceedings of the IEEE First International Conference on Mobile Services, pp. 9–16.
Jin, 2014, An information framework for creating a smart city through Internet of Things, IEEE Internet Things J., 1, 112, 10.1109/JIOT.2013.2296516
Jung, 2013, Privacy preserving cloud data access with multi-authorities, IEEE Infocom, 2625
Kalnis, 2007, Preventing location-based identity inference in anonymous spatial queries, IEEE Trans. Knowl. Data Eng., 19, 1719, 10.1109/TKDE.2007.190662
Lai, 2014, CPAL: a conditional privacy-preserving authentication with access linkability for roaming service, IEEE Internet Things J., 1, 46, 10.1109/JIOT.2014.2306673
Li, 2013, Search me if you can: privacy-preserving location query service, IEEE Infocom, 2760
Liao, 2015, Protecting user trajectory in location-based services, IEEE Globecom, 1
Liao, D., Huang, X., Anand, V., et al., 2016. k-DLCA: An efficient approach for location privacy preservation in location-based services. In: Proceedings of the IEEE International Conference on Communications (ICC), pp. 1–6.
Lindenberg, P., Cheng, B., Hsueh, Y., 2015. Novel location privacy protection strategies for location-based services. In: Proceedings of the IEEE Seventh International Conference on Ubiquitous and Future Networks, pp. 866–870.
Liu, 2012, Traffic aware multiple mix zone placement for protecting location privacy, IEEE Infocom, 972
Liu, 2013, A game-theoretic approach for achieving k-anonymity in Location Based- Services, IEEE Infocom, 2985
Lu, 2008, PAD: privacy-area aware, dummy based location privacy in mobile services, ACM MobiDE, 16, 10.1145/1626536.1626540
Lu, 2014, PLAM: a privacy preserving framework for local-area mobile social networks, IEEE Infocom, 763
Ma, 2013, Privacy vulnerability of published anonymous mobility traces, IEEE/ACM Trans. Netw., 720, 10.1109/TNET.2012.2208983
Malina, 2016, On perspective of security and privacy-preserving solutions in the Internet of Things, Comput. Netw., 102, 83, 10.1016/j.comnet.2016.03.011
Minch, R., 2015. Location privacy in the Era of the Internet of Things and Big Data analytics. In: Proceedings of the IEEE Hawaii 48th International Conference on System Sciences, pp. 521–1530.
Ni, 2016, Location privacy-preserving k nearest neighbor query under user's preference, Knowl. Based Syst., 103, 19, 10.1016/j.knosys.2016.03.016
Niu, B., Zhu, X., Chi, H., Li, H., 2013. 3PLUS: Privacy-preserving pseudo-location updating system in location-based services. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pp. 4564–4569.
Niu, 2014, Privacy-area aware dummy generation algorithms for location-based services, IEEE ICC, 957
Niu, 2014, Achieving k-anonymity in privacy -aware location-based services, IEEE Infocom, 754
Niu, 2015, Enhancing privacy through caching in location-based services, IEEE Infocom, 1017
Niu, B., Gao, S., Li, F., et al., 2016. Protection of location privacy in continuous LBSs against adversaries with background information. In: Proceedings of the IEEE International Conference on Computing, Networking and Communications (ICNC), pp. 1–6.
Peng, 2017, Collaborative trajectory privacy preserving scheme in location-based services, Inf. Sci., 387, 165, 10.1016/j.ins.2016.08.010
Porambage, 2016, The quest for privacy in the Internet of Things, IEEE Cloud Comput., 3, 36, 10.1109/MCC.2016.28
Premnath, 2015, Security and privacy in the internet-of-things under time-and-budget-limited adversary mode, IEEE Wirel. Commun. Lett., 4, 277, 10.1109/LWC.2015.2408609
Sadeghi, A., Wachsmann, C., Waidner, M., 2015. Security and privacy challenges in industrial Internet of Things. In: Proceedings of the ACM 52nd Annual Design Automation Conference, 54.
Serjantov, A., Danezis, G., 2003. Towards an information theoretic metric for anonymity. In: Proceedings of the International Conference on Privacy enhancing technologies, pp. 41–53.
Shao, 2014, FINE: a fine-grained privacy-preserving location-based service framework for mobile devices, IEEE Infocom, 244
Sicari, 2015, Security, privacy and trust in Internet of Things: the road ahead, Comput. Netw., 76, 146, 10.1016/j.comnet.2014.11.008
Sun, 2017, ASA: against statistical attacks for privacy-aware users in location based service, Future Gener. Comput. Syst., 70, 48, 10.1016/j.future.2016.06.017
Tang, 2016, Long-term location privacy protection for location-based services in mobile cloud computing, Soft Comput., 20, 1735, 10.1007/s00500-015-1703-8
Vu, 2012, Efficient algorithms for k-anonymous location privacy in participatory sensing, IEEE Infocom
Wang, 2012, L2p2: location aware location privacy protection for location-based services, IEEE Infocom, 1996
Weinberg, 2015, Internet of things: convenience vs. privacy and secrecy, Bus. Horiz., 58, 615, 10.1016/j.bushor.2015.06.005
Ye, 2017, A novel location privacy-preserving scheme based on l-queries for continuous LBS, Comput. Commun., 98, 1, 10.1016/j.comcom.2016.06.005
Yi, X., Paulet, R., Bertino, E., 2014. Practical k nearest neighbor queries with location privacy. In: Proceedings of the IEEE 30th International Conference on Data Engineering (ICDE), pp. 640–651.
Ying, 2014, Protecting location privacy with clustering anonymization in vehicular networks, IEEE Infocom Workshops, 305
Zhang, 2016, On designing satisfaction ratio aware truthful incentive mechanisms for k-anonymity location privacy, IEEE Trans. Inf. Forensics Secur., 11, 2528, 10.1109/TIFS.2016.2587241
Zhao, 2014, An efficient privacy preserving location based service system, IEEE Globecom, 576
Zhu, 2013, Mobi Cache: when k-anonymity meets cache, IEEE Globecom, 820
Zhu, X., Chi, H., Jiang, S., 2014. Using dynamic pseudo-IDs to protect privacy in location-based services. In: Proceedings of the IEEE International Conference on Communications (ICC), pp. 2307–2312.