Your browser doesn't support javascript.
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services.
Zhang, Shiwen; Li, Mengling; Liang, Wei; Sandor, Voundi Koe Arthur; Li, Xiong.
  • Zhang S; School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China.
  • Li M; School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China.
  • Liang W; School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China.
  • Sandor VKA; School of Computer Science and Cyber Engineering, Guangzhou University, Guangzhou 510006, China.
  • Li X; School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China.
Sensors (Basel) ; 22(16)2022 Aug 17.
Article in English | MEDLINE | ID: covidwho-2024042
ABSTRACT
As smart devices and mobile positioning technologies improve, location-based services (LBS) have grown in popularity. The LBS environment provides considerable convenience to users, but it also poses a significant threat to their privacy. A large number of research works have emerged to protect users' privacy. Dummy-based location privacy protection solutions have been widely adopted for their simplicity and enhanced privacy protection results, but there are few reviews on dummy-based location privacy protection. Or, for existing works, some focus on aspects of cryptography, anonymity, or other comprehensive reviews that do not provide enough reviews on dummy-based privacy protection. In this paper, the authors provide a review of dummy-based location privacy protection techniques for location-based services. More specifically, the connection between the level of privacy protection, the quality of service, and the system overhead is summarized. The difference and connection between various location privacy protection techniques are also described. The dummy-based attack models are presented. Then, the algorithms for dummy location selection are analyzed and evaluated. Finally, we thoroughly evaluate different dummy location selection methods and arrive at a highly useful evaluation result. This result is valuable both to users and researchers who are studying this field.
Subject(s)
Keywords

Full text: Available Collection: International databases Database: MEDLINE Main subject: Computer Security / Privacy Type of study: Experimental Studies / Observational study Language: English Year: 2022 Document Type: Article Affiliation country: S22166141

Similar

MEDLINE

...
LILACS

LIS


Full text: Available Collection: International databases Database: MEDLINE Main subject: Computer Security / Privacy Type of study: Experimental Studies / Observational study Language: English Year: 2022 Document Type: Article Affiliation country: S22166141