Myself: Local perturbation for location privacy in LBS applications.
References
830 citations
"Myself: Local perturbation for loca..." refers background in this paper
...Gabrial in [4], presented information retrieval based work of cloaking....
[...]
246 citations
106 citations
"Myself: Local perturbation for loca..." refers methods in this paper
...The methods in paper [3] shows that real locations are distorted which prevents the provider from learning private information of the users....
[...]
...In [3],[8],[9], K-anonymity schemes are used which authors have used hybrid approach....
[...]
60 citations
"Myself: Local perturbation for loca..." refers background in this paper
...In [2],[4],[6], private information retrieval is demonstrated where threat is central servers from where data is retrieved and sent to client....
[...]
58 citations
"Myself: Local perturbation for loca..." refers background or methods in this paper
...[I ],[2], papers discuss about classification and also shows drawback of centralised and trusted party based privacy schemes....
[...]
...In another paper [2], classify under this category all the methods that do not distort the location of LBS users to protect their privacy....
[...]
...In [2],[4],[6], private information retrieval is demonstrated where threat is central servers from where data is retrieved and sent to client....
[...]