{"title":"保护隐私的基于位置服务缓存管理技术","authors":"Yu Chen, Jie Bao, Wei-Shinn Ku, Jiun-Long Huang","doi":"10.1109/MDMW.2008.2","DOIUrl":null,"url":null,"abstract":"In order to access location-based services, mobile users have to disclose their exact locations to service providers. However, adversaries could collect the location information for purposes against mobile users' privacy. There are existing solutions for privacy protection by utilizing the K-anonymity model. However, the computational and communication costs are high. This research proposes cache management techniques for further improving user privacy protection, saving computational power, and decreasing communication costs.","PeriodicalId":242324,"journal":{"name":"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Cache Management Techniques for Privacy Preserving Location-based Services\",\"authors\":\"Yu Chen, Jie Bao, Wei-Shinn Ku, Jiun-Long Huang\",\"doi\":\"10.1109/MDMW.2008.2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to access location-based services, mobile users have to disclose their exact locations to service providers. However, adversaries could collect the location information for purposes against mobile users' privacy. There are existing solutions for privacy protection by utilizing the K-anonymity model. However, the computational and communication costs are high. This research proposes cache management techniques for further improving user privacy protection, saving computational power, and decreasing communication costs.\",\"PeriodicalId\":242324,\"journal\":{\"name\":\"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-04-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MDMW.2008.2\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Ninth International Conference on Mobile Data Management Workshops, MDMW","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MDMW.2008.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cache Management Techniques for Privacy Preserving Location-based Services
In order to access location-based services, mobile users have to disclose their exact locations to service providers. However, adversaries could collect the location information for purposes against mobile users' privacy. There are existing solutions for privacy protection by utilizing the K-anonymity model. However, the computational and communication costs are high. This research proposes cache management techniques for further improving user privacy protection, saving computational power, and decreasing communication costs.