scispace - formally typeset
Open AccessJournal Article

Protecting Location Privacy with Personalized k-anonymity

TLDR
Simulation results show that when the user's requireements for high security situations, the proposed algorithm has faster anonymity speed compared to the ordinary anonymous algorithm, meanwhile the success rate of anonymity has also been improved.
Abstract
This paper presents a new k-anonymity algorithm based on the personalized k-anonymity model.Increasing anonymous group of anonymous memory modules in the ordinary algorithm speeds up the anonymous speed.Simulation results show that when the user's requireements for high security situations,the proposed algorithm has faster anonymity speed compared to the ordinary anonymous algorithm,meanwhile the success rate of anonymity has also been improved.When users have the low security requirements,the proposed algorithm has slower anonymous speed than the normal algorithm,advantages of the success rate were not evident.

read more

Citations
More filters
Journal ArticleDOI

The effect of homogeneity on the computational complexity of combinatorial data anonymization

TL;DR: The fixed-parameter tractability result implies that k-Anonymity can be solved in linear time when tin is a constant, and the computational hardness results extend to p-Sensitivity and the usage of domain generalization hierarchies.
Proceedings ArticleDOI

Multiple Mix-Zones Deployment for Continuous Location Privacy Protection

TL;DR: Inspired by the notion that "where you drive more is where you more likely need to change pseudonyms", this work treats the problem of optimal multiple mix-zones as a transportation problem, and proposes a heuristic algorithm to strategically select the mix-zone locations.
Proceedings ArticleDOI

Research on IoT Privacy Security Risks

Wang Xi, +1 more
TL;DR: The paper studied the causes of privacy security risks, and put forward some relevant IoT risk prevention methods that have some certain practicabilities that would provide an important theoretical reference value in the field of scientific research and engineering.
Journal ArticleDOI

Privacy enhancements for mobile and social uses of consumer electronics

TL;DR: Middleware architecture and methodology are presented that can help give users of buddy-mapping services greater awareness of who is about to see them before they are actually seen, since once one is seen on another's map, one's intent can sometimes be inferred.
Book ChapterDOI

Evaluation of Engineering Approaches in the Secure Software Development Life Cycle

TL;DR: The evaluation approach, called SecEval, supports the search and comparison of these artifacts and has the possibility to easily extend the models, which is exemplarily shown for risk rating and experimental approaches.