Location-based Privacy-preserving Techniques in Connected Environment: A Survey

Yuchen Yan, Keke Gai*, Peng Jiang, Lei Xu, Liehuang Zhu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

With the development of networking technologies, the amount of the connected device has been dramatically increasing over the years. Privacy issues gradually have become a widely accepted obstacle that restrict many web-based applications. One of the major concerns in privacy-preserving is to protect individuals' location privacy. This survey investigates location-based privacy protection technologies and gathered a few representative recent studies addressing this issue. An analysis has been given in this survey in order to assess the existing solutions (e.g., advantages and disadvantages) and highlight potential research directions for future explorations.

Original languageEnglish
Title of host publicationProceedings - 4th IEEE International Conference on Smart Cloud, SmartCloud 2019 and 3rd International Symposium on Reinforcement Learning, ISRL 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages156-162
Number of pages7
ISBN (Electronic)9781728155050
DOIs
Publication statusPublished - Dec 2019
Event4th IEEE International Conference on Smart Cloud, SmartCloud 2019 and 3rd International Symposium on Reinforcement Learning, ISRL 2019 - Tokyo, Japan
Duration: 10 Dec 201912 Dec 2019

Publication series

NameProceedings - 4th IEEE International Conference on Smart Cloud, SmartCloud 2019 and 3rd International Symposium on Reinforcement Learning, ISRL 2019

Conference

Conference4th IEEE International Conference on Smart Cloud, SmartCloud 2019 and 3rd International Symposium on Reinforcement Learning, ISRL 2019
Country/TerritoryJapan
CityTokyo
Period10/12/1912/12/19

Keywords

  • GeoHash nearest neighbor querying
  • Privacy-preserving
  • location-based privacy
  • multi-level encryption
  • query-based privacy

Fingerprint

Dive into the research topics of 'Location-based Privacy-preserving Techniques in Connected Environment: A Survey'. Together they form a unique fingerprint.

Cite this