Open Access

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix

   | Jul 03, 2015

Cite

1. Gruteser, M., D. Grunwald. Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. - In: Proc. of 1st International Conference on Mobile Systems, Applications and Services. ACM, 2003, pp. 31-42.10.1145/1066116.1189037Search in Google Scholar

2. Xiao-Feng, H. U. O. Z. M. A Survey of Trajectory Privacy-Preserving Techniques. - Chinese Journal of Computers, Vol. 10, 2011.Search in Google Scholar

3. Huo, Z., X. Meng, H. Hu, et al. You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection. - In: Proc. of Database Systems for Advanced Applications.Springer Berlin Heidelberg, 2012, pp. 351-366.Search in Google Scholar

4. You, T. H., W. C. Peng, W. C. Lee. Protecting Moving Trajectories with Dummies. - In: Proc. of Mobile Data Management, 2007 International Conference on. IEEE, 2007, pp. 278-282.10.1109/MDM.2007.58Search in Google Scholar

5. Terrovitis, M., N. Mamoulis. Privacy Preservation in the Publication of Trajectories. - In: Proc. of Mobile Data Management. (MDM’08) 9th International Conference on IEEE, 2008, pp. 65-72.10.1109/MDM.2008.29Search in Google Scholar

6. Abul, O., F. Bonchi, M. Nanni. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases. - In: Proc. of Data Engineering (ICDE’2008) IEEE 24th International Conference on IEEE, 2008, pp. 376-385.Search in Google Scholar

7. Nergiz, M. E., M. Atzori, Y. Saygin. Towards Trajectory Anonymization: A Generalization-Based Approach. - In: Proc. of SIGSPATIAL ACM GIS’2008 International Workshop on Security and Privacy in GIS and LBS. ACM, 2008, pp. 52-61.Search in Google Scholar

8. Yarovoy, R., F. Bonchi, L. V. S. Lakshmanan et al. Anonymizing Moving Objects: How to Hide a MOB in a Crowd? - In: Proc. of 12th International Conference on Extending Database Technology: Advances in Database Technology. ACM, 2009, pp. 72-83.Search in Google Scholar

9. Sadilek, A., H. Kautz, J. P. Bigham. Finding Your Friends and Following Them to Where You Are. - In: Proc. of 5th ACM International Conference on Web Search and Data Mining. ACM, 2012, pp. 723-732.10.1145/2124295.2124380Search in Google Scholar

10. Freni, D., C. Ruiz Vicente, S. Mascetti et al. Preserving Location and Absence Privacy in Geo-Social Networks. - In: Proc. of 19th ACM International Conference on Information and Knowledge Management, ACM, 2010, pp. 309-318.10.1145/1871437.1871480Search in Google Scholar

11. Mascetti, S., D. Freni, C. Bettini et al. Privacy in Geo-Social Networks: Proximity Notification with Untrusted Service Providers and Curious Buddies. - The VLDB Journal - The International Journal on Very Large Data Bases, Vol. 20, 2011, No 4, pp. 541-566.10.1007/s00778-010-0213-7Search in Google Scholar

12. Mascetti, S., C. Bettini, D. Freni et al. Privacy-Aware Proximity Based Services. - In: Proc. of Mobile Data Management: Systems, Services and Middleware, 2009. MDM'09.Tenth International Conference on IEEE, 2009, pp. 31-40.Search in Google Scholar

13. Huo, Z, X. F. Meng, Y. Huang. PrivateCheckIn: Trajectory Privacy-Preserving for Check-in Services in MSNS. - Jisuanji Xuebao, Chinese Journal of Computers, Vol. 36, 2013, No 4, pp. 716-726.10.3724/SP.J.1016.2013.00716Search in Google Scholar

14. Cho, E, S. A. Myers, J. Leskovec. Friendship and Mobility: User Movement in Location- Based Social Networks. - In: Proc. of 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 2011, pp. 1082-1090.Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology