Open AccessJournal Article
Protecting Location Privacy with Personalized k-anonymity
TLDR
Simulation results show that when the user's requireements for high security situations, the proposed algorithm has faster anonymity speed compared to the ordinary anonymous algorithm, meanwhile the success rate of anonymity has also been improved.Abstract:
This paper presents a new k-anonymity algorithm based on the personalized k-anonymity model.Increasing anonymous group of anonymous memory modules in the ordinary algorithm speeds up the anonymous speed.Simulation results show that when the user's requireements for high security situations,the proposed algorithm has faster anonymity speed compared to the ordinary anonymous algorithm,meanwhile the success rate of anonymity has also been improved.When users have the low security requirements,the proposed algorithm has slower anonymous speed than the normal algorithm,advantages of the success rate were not evident.read more
Citations
More filters
Journal ArticleDOI
The effect of homogeneity on the computational complexity of combinatorial data anonymization
TL;DR: The fixed-parameter tractability result implies that k-Anonymity can be solved in linear time when tin is a constant, and the computational hardness results extend to p-Sensitivity and the usage of domain generalization hierarchies.
Proceedings ArticleDOI
Multiple Mix-Zones Deployment for Continuous Location Privacy Protection
TL;DR: Inspired by the notion that "where you drive more is where you more likely need to change pseudonyms", this work treats the problem of optimal multiple mix-zones as a transportation problem, and proposes a heuristic algorithm to strategically select the mix-zone locations.
Proceedings ArticleDOI
Research on IoT Privacy Security Risks
TL;DR: The paper studied the causes of privacy security risks, and put forward some relevant IoT risk prevention methods that have some certain practicabilities that would provide an important theoretical reference value in the field of scientific research and engineering.
Journal ArticleDOI
Privacy enhancements for mobile and social uses of consumer electronics
TL;DR: Middleware architecture and methodology are presented that can help give users of buddy-mapping services greater awareness of who is about to see them before they are actually seen, since once one is seen on another's map, one's intent can sometimes be inferred.
Book ChapterDOI
Evaluation of Engineering Approaches in the Secure Software Development Life Cycle
TL;DR: The evaluation approach, called SecEval, supports the search and comparison of these artifacts and has the possibility to easily extend the models, which is exemplarily shown for risk rating and experimental approaches.
Related Papers (5)
An Alternative Approach to k-Anonymity for Location-Based Services
Amirreza Masoumzadeh,James Joshi +1 more
Location privacy protection method based on combination of k-anonymity and service similarity
Ayong Ye,Li Yacheng,Xu Li +2 more