A novel attack to spatial cloaking schemes in location-based services
Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been propose...
Ausführliche Beschreibung
Autor*in: |
Niu, Ben [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2015transfer abstract |
---|
Schlagwörter: |
---|
Umfang: |
8 |
---|
Übergeordnetes Werk: |
Enthalten in: Surgeon-patient matching based on pairwise comparisons information for elective surgery - Jiang, Yan-Ping ELSEVIER, 2020, Amsterdam [u.a.] |
---|---|
Übergeordnetes Werk: |
volume:49 ; year:2015 ; pages:125-132 ; extent:8 |
Links: |
---|
DOI / URN: |
10.1016/j.future.2014.10.026 |
---|
Katalog-ID: |
ELV018266355 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV018266355 | ||
003 | DE-627 | ||
005 | 20230625123745.0 | ||
007 | cr uuu---uuuuu | ||
008 | 180602s2015 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.future.2014.10.026 |2 doi | |
028 | 5 | 2 | |a GBVA2015004000025.pica |
035 | |a (DE-627)ELV018266355 | ||
035 | |a (ELSEVIER)S0167-739X(14)00220-9 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | |a 004 | |
082 | 0 | 4 | |a 004 |q DE-600 |
082 | 0 | 4 | |a 004 |q VZ |
084 | |a 85.35 |2 bkl | ||
084 | |a 54.80 |2 bkl | ||
100 | 1 | |a Niu, Ben |e verfasserin |4 aut | |
245 | 1 | 0 | |a A novel attack to spatial cloaking schemes in location-based services |
264 | 1 | |c 2015transfer abstract | |
300 | |a 8 | ||
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. | ||
520 | |a Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. | ||
650 | 7 | |a Internet of things |2 Elsevier | |
650 | 7 | |a Wireless communications |2 Elsevier | |
650 | 7 | |a Location privacy |2 Elsevier | |
650 | 7 | |a Location-based services |2 Elsevier | |
650 | 7 | |a Mobile computing |2 Elsevier | |
700 | 1 | |a Zhu, Xiaoyan |4 oth | |
700 | 1 | |a Li, Qinghua |4 oth | |
700 | 1 | |a Chen, Jie |4 oth | |
700 | 1 | |a Li, Hui |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier Science |a Jiang, Yan-Ping ELSEVIER |t Surgeon-patient matching based on pairwise comparisons information for elective surgery |d 2020 |g Amsterdam [u.a.] |w (DE-627)ELV004280385 |
773 | 1 | 8 | |g volume:49 |g year:2015 |g pages:125-132 |g extent:8 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.future.2014.10.026 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
936 | b | k | |a 85.35 |j Fertigung |q VZ |
936 | b | k | |a 54.80 |j Angewandte Informatik |q VZ |
951 | |a AR | ||
952 | |d 49 |j 2015 |h 125-132 |g 8 | ||
953 | |2 045F |a 004 |
author_variant |
b n bn |
---|---|
matchkey_str |
niubenzhuxiaoyanliqinghuachenjielihui:2015----:nvltakoptacoknshmsnoa |
hierarchy_sort_str |
2015transfer abstract |
bklnumber |
85.35 54.80 |
publishDate |
2015 |
allfields |
10.1016/j.future.2014.10.026 doi GBVA2015004000025.pica (DE-627)ELV018266355 (ELSEVIER)S0167-739X(14)00220-9 DE-627 ger DE-627 rakwb eng 004 004 DE-600 004 VZ 85.35 bkl 54.80 bkl Niu, Ben verfasserin aut A novel attack to spatial cloaking schemes in location-based services 2015transfer abstract 8 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. Internet of things Elsevier Wireless communications Elsevier Location privacy Elsevier Location-based services Elsevier Mobile computing Elsevier Zhu, Xiaoyan oth Li, Qinghua oth Chen, Jie oth Li, Hui oth Enthalten in Elsevier Science Jiang, Yan-Ping ELSEVIER Surgeon-patient matching based on pairwise comparisons information for elective surgery 2020 Amsterdam [u.a.] (DE-627)ELV004280385 volume:49 year:2015 pages:125-132 extent:8 https://doi.org/10.1016/j.future.2014.10.026 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 85.35 Fertigung VZ 54.80 Angewandte Informatik VZ AR 49 2015 125-132 8 045F 004 |
spelling |
10.1016/j.future.2014.10.026 doi GBVA2015004000025.pica (DE-627)ELV018266355 (ELSEVIER)S0167-739X(14)00220-9 DE-627 ger DE-627 rakwb eng 004 004 DE-600 004 VZ 85.35 bkl 54.80 bkl Niu, Ben verfasserin aut A novel attack to spatial cloaking schemes in location-based services 2015transfer abstract 8 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. Internet of things Elsevier Wireless communications Elsevier Location privacy Elsevier Location-based services Elsevier Mobile computing Elsevier Zhu, Xiaoyan oth Li, Qinghua oth Chen, Jie oth Li, Hui oth Enthalten in Elsevier Science Jiang, Yan-Ping ELSEVIER Surgeon-patient matching based on pairwise comparisons information for elective surgery 2020 Amsterdam [u.a.] (DE-627)ELV004280385 volume:49 year:2015 pages:125-132 extent:8 https://doi.org/10.1016/j.future.2014.10.026 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 85.35 Fertigung VZ 54.80 Angewandte Informatik VZ AR 49 2015 125-132 8 045F 004 |
allfields_unstemmed |
10.1016/j.future.2014.10.026 doi GBVA2015004000025.pica (DE-627)ELV018266355 (ELSEVIER)S0167-739X(14)00220-9 DE-627 ger DE-627 rakwb eng 004 004 DE-600 004 VZ 85.35 bkl 54.80 bkl Niu, Ben verfasserin aut A novel attack to spatial cloaking schemes in location-based services 2015transfer abstract 8 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. Internet of things Elsevier Wireless communications Elsevier Location privacy Elsevier Location-based services Elsevier Mobile computing Elsevier Zhu, Xiaoyan oth Li, Qinghua oth Chen, Jie oth Li, Hui oth Enthalten in Elsevier Science Jiang, Yan-Ping ELSEVIER Surgeon-patient matching based on pairwise comparisons information for elective surgery 2020 Amsterdam [u.a.] (DE-627)ELV004280385 volume:49 year:2015 pages:125-132 extent:8 https://doi.org/10.1016/j.future.2014.10.026 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 85.35 Fertigung VZ 54.80 Angewandte Informatik VZ AR 49 2015 125-132 8 045F 004 |
allfieldsGer |
10.1016/j.future.2014.10.026 doi GBVA2015004000025.pica (DE-627)ELV018266355 (ELSEVIER)S0167-739X(14)00220-9 DE-627 ger DE-627 rakwb eng 004 004 DE-600 004 VZ 85.35 bkl 54.80 bkl Niu, Ben verfasserin aut A novel attack to spatial cloaking schemes in location-based services 2015transfer abstract 8 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. Internet of things Elsevier Wireless communications Elsevier Location privacy Elsevier Location-based services Elsevier Mobile computing Elsevier Zhu, Xiaoyan oth Li, Qinghua oth Chen, Jie oth Li, Hui oth Enthalten in Elsevier Science Jiang, Yan-Ping ELSEVIER Surgeon-patient matching based on pairwise comparisons information for elective surgery 2020 Amsterdam [u.a.] (DE-627)ELV004280385 volume:49 year:2015 pages:125-132 extent:8 https://doi.org/10.1016/j.future.2014.10.026 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 85.35 Fertigung VZ 54.80 Angewandte Informatik VZ AR 49 2015 125-132 8 045F 004 |
allfieldsSound |
10.1016/j.future.2014.10.026 doi GBVA2015004000025.pica (DE-627)ELV018266355 (ELSEVIER)S0167-739X(14)00220-9 DE-627 ger DE-627 rakwb eng 004 004 DE-600 004 VZ 85.35 bkl 54.80 bkl Niu, Ben verfasserin aut A novel attack to spatial cloaking schemes in location-based services 2015transfer abstract 8 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. Internet of things Elsevier Wireless communications Elsevier Location privacy Elsevier Location-based services Elsevier Mobile computing Elsevier Zhu, Xiaoyan oth Li, Qinghua oth Chen, Jie oth Li, Hui oth Enthalten in Elsevier Science Jiang, Yan-Ping ELSEVIER Surgeon-patient matching based on pairwise comparisons information for elective surgery 2020 Amsterdam [u.a.] (DE-627)ELV004280385 volume:49 year:2015 pages:125-132 extent:8 https://doi.org/10.1016/j.future.2014.10.026 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 85.35 Fertigung VZ 54.80 Angewandte Informatik VZ AR 49 2015 125-132 8 045F 004 |
language |
English |
source |
Enthalten in Surgeon-patient matching based on pairwise comparisons information for elective surgery Amsterdam [u.a.] volume:49 year:2015 pages:125-132 extent:8 |
sourceStr |
Enthalten in Surgeon-patient matching based on pairwise comparisons information for elective surgery Amsterdam [u.a.] volume:49 year:2015 pages:125-132 extent:8 |
format_phy_str_mv |
Article |
bklname |
Fertigung Angewandte Informatik |
institution |
findex.gbv.de |
topic_facet |
Internet of things Wireless communications Location privacy Location-based services Mobile computing |
dewey-raw |
004 |
isfreeaccess_bool |
false |
container_title |
Surgeon-patient matching based on pairwise comparisons information for elective surgery |
authorswithroles_txt_mv |
Niu, Ben @@aut@@ Zhu, Xiaoyan @@oth@@ Li, Qinghua @@oth@@ Chen, Jie @@oth@@ Li, Hui @@oth@@ |
publishDateDaySort_date |
2015-01-01T00:00:00Z |
hierarchy_top_id |
ELV004280385 |
dewey-sort |
14 |
id |
ELV018266355 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV018266355</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625123745.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180602s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.future.2014.10.026</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2015004000025.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV018266355</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0167-739X(14)00220-9</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">85.35</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.80</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Niu, Ben</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A novel attack to spatial cloaking schemes in location-based services</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">8</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet of things</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communications</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Location privacy</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Location-based services</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mobile computing</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Xiaoyan</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Qinghua</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Jie</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Hui</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science</subfield><subfield code="a">Jiang, Yan-Ping ELSEVIER</subfield><subfield code="t">Surgeon-patient matching based on pairwise comparisons information for elective surgery</subfield><subfield code="d">2020</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV004280385</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:49</subfield><subfield code="g">year:2015</subfield><subfield code="g">pages:125-132</subfield><subfield code="g">extent:8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.future.2014.10.026</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">85.35</subfield><subfield code="j">Fertigung</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.80</subfield><subfield code="j">Angewandte Informatik</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">49</subfield><subfield code="j">2015</subfield><subfield code="h">125-132</subfield><subfield code="g">8</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">004</subfield></datafield></record></collection>
|
author |
Niu, Ben |
spellingShingle |
Niu, Ben ddc 004 bkl 85.35 bkl 54.80 Elsevier Internet of things Elsevier Wireless communications Elsevier Location privacy Elsevier Location-based services Elsevier Mobile computing A novel attack to spatial cloaking schemes in location-based services |
authorStr |
Niu, Ben |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV004280385 |
format |
electronic Article |
dewey-ones |
004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
004 004 DE-600 004 VZ 85.35 bkl 54.80 bkl A novel attack to spatial cloaking schemes in location-based services Internet of things Elsevier Wireless communications Elsevier Location privacy Elsevier Location-based services Elsevier Mobile computing Elsevier |
topic |
ddc 004 bkl 85.35 bkl 54.80 Elsevier Internet of things Elsevier Wireless communications Elsevier Location privacy Elsevier Location-based services Elsevier Mobile computing |
topic_unstemmed |
ddc 004 bkl 85.35 bkl 54.80 Elsevier Internet of things Elsevier Wireless communications Elsevier Location privacy Elsevier Location-based services Elsevier Mobile computing |
topic_browse |
ddc 004 bkl 85.35 bkl 54.80 Elsevier Internet of things Elsevier Wireless communications Elsevier Location privacy Elsevier Location-based services Elsevier Mobile computing |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
x z xz q l ql j c jc h l hl |
hierarchy_parent_title |
Surgeon-patient matching based on pairwise comparisons information for elective surgery |
hierarchy_parent_id |
ELV004280385 |
dewey-tens |
000 - Computer science, knowledge & systems |
hierarchy_top_title |
Surgeon-patient matching based on pairwise comparisons information for elective surgery |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV004280385 |
title |
A novel attack to spatial cloaking schemes in location-based services |
ctrlnum |
(DE-627)ELV018266355 (ELSEVIER)S0167-739X(14)00220-9 |
title_full |
A novel attack to spatial cloaking schemes in location-based services |
author_sort |
Niu, Ben |
journal |
Surgeon-patient matching based on pairwise comparisons information for elective surgery |
journalStr |
Surgeon-patient matching based on pairwise comparisons information for elective surgery |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2015 |
contenttype_str_mv |
zzz |
container_start_page |
125 |
author_browse |
Niu, Ben |
container_volume |
49 |
physical |
8 |
class |
004 004 DE-600 004 VZ 85.35 bkl 54.80 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Niu, Ben |
doi_str_mv |
10.1016/j.future.2014.10.026 |
dewey-full |
004 |
title_sort |
a novel attack to spatial cloaking schemes in location-based services |
title_auth |
A novel attack to spatial cloaking schemes in location-based services |
abstract |
Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. |
abstractGer |
Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. |
abstract_unstemmed |
Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U |
title_short |
A novel attack to spatial cloaking schemes in location-based services |
url |
https://doi.org/10.1016/j.future.2014.10.026 |
remote_bool |
true |
author2 |
Zhu, Xiaoyan Li, Qinghua Chen, Jie Li, Hui |
author2Str |
Zhu, Xiaoyan Li, Qinghua Chen, Jie Li, Hui |
ppnlink |
ELV004280385 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth oth oth |
doi_str |
10.1016/j.future.2014.10.026 |
up_date |
2024-07-06T18:25:26.018Z |
_version_ |
1803855148896747520 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV018266355</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625123745.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180602s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.future.2014.10.026</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2015004000025.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV018266355</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0167-739X(14)00220-9</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">85.35</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.80</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Niu, Ben</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A novel attack to spatial cloaking schemes in location-based services</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2015transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">8</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Location-based services (LBSs) have been one of the novel uses and most popular activities in internet of things (IoT). In such location-based applications, mobile users enjoy plenty of conveniences at the cost of privacy. To protect user’s location privacy, many research solutions have been proposed. In this paper, we focus on an important class of solutions, short-range communication-based spatial cloaking algorithms, which achieve k -anonymity within some collaborative groups. We first analyze the inherent drawbacks of existing P2P-based and encounter-based spatial cloaking approaches and propose a Variance-Based Attack (VBA) against them. Then we study the proposed attack on several existing spatial cloaking solutions. Finally, we propose a countermeasure R -cloak, which can mitigate VBA for current P2P cloaking algorithms. Our empirical evaluations further verify the effectiveness and efficiency of R -cloak.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet of things</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communications</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Location privacy</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Location-based services</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Mobile computing</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Xiaoyan</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Qinghua</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chen, Jie</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Li, Hui</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science</subfield><subfield code="a">Jiang, Yan-Ping ELSEVIER</subfield><subfield code="t">Surgeon-patient matching based on pairwise comparisons information for elective surgery</subfield><subfield code="d">2020</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV004280385</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:49</subfield><subfield code="g">year:2015</subfield><subfield code="g">pages:125-132</subfield><subfield code="g">extent:8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.future.2014.10.026</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">85.35</subfield><subfield code="j">Fertigung</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">54.80</subfield><subfield code="j">Angewandte Informatik</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">49</subfield><subfield code="j">2015</subfield><subfield code="h">125-132</subfield><subfield code="g">8</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">004</subfield></datafield></record></collection>
|
score |
7.3975964 |