4.7 Article

Anonymous and Linkable Location-Based Services

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

P2LBS: Privacy Provisioning in Location-Based Services

Vijay Kumar Yadav et al.

Summary: A privacy-provisioning location-based service (P2LBS) scheme is proposed to protect the privacy of user queries and services provided by the server, while also offering anonymous payment. The scheme utilizes ring signatures for user authentication and an anonymous payment protocol for server authentication. Query privacy and services' reply privacy are ensured through an oblivious transfer protocol. Results demonstrate that the P2LBS scheme is more efficient in terms of communication and computation costs compared to other current state-of-the-art schemes, fulfilling all the necessary requirements for a viable LBS scheme.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Engineering, Civil

Linkable Privacy-Preserving Scheme for Location-Based Services

Vijay Kumar Yadav et al.

Summary: User and point of interest (POI) privacy are major concerns in location-based services (LBS). Current schemes either protect query content or location privacy. The proposed L2BSWOT scheme reduces communication and computation costs while meeting all privacy requirements in LBS.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Information Systems

Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter

Xingxin Li et al.

Summary: This paper proposes a novel privacy preserving LBS scheme that utilizes k-anonymity technique and pseudo random function to protect user privacy, and designs an enhanced blind filter protocol based on the Paillier cryptosystem for secure filtering. The proposed scheme ensures user privacy protection and high query efficiency while incurring low computation and communication costs on the server side. Through theoretical analysis and extensive experiments, the security and efficiency of the proposed scheme are demonstrated.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)

Article Computer Science, Information Systems

A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments

Daya Sagar Gupta et al.

Summary: This article presents an identity-based two-party authenticated key agreement (ID-2PAKA) protocol for secure communication and data sharing in the Internet of Things (IoT) environment. Performance analysis of the proposed protocol demonstrates its security and efficiency.

IEEE SYSTEMS JOURNAL (2021)

Article Engineering, Electrical & Electronic

Modeling and Analysis of the Downlink Local Delay in MEC-Based VANETs

Yuying Wu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Efficient and Secure Location-Based Services Scheme in VANET

Vijay Kumar Yadav et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Telecommunications

Efficient LBS Security-Preserving Based on NTRU Oblivious Transfer

Bo Bi et al.

WIRELESS PERSONAL COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services

Jing Chen et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2018)

Article Engineering, Electrical & Electronic

Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services

Qin Hu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Information Systems

A Dual Privacy Preserving Scheme in Continuous Location-Based Services

Shaobo Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing

Yanmin Gong et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2018)

Article Computer Science, Information Systems

Achieving Location Privacy through CAST in Location Based Services

Ruchika Gupta et al.

JOURNAL OF COMMUNICATIONS AND NETWORKS (2017)

Article Telecommunications

An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy

Hoda Jannati et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Telecommunications

An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey

Ruchika Gupta et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Computer Science, Artificial Intelligence

Location privacy-preserving k nearest neighbor query under user's preference

Weiwei Ni et al.

KNOWLEDGE-BASED SYSTEMS (2016)

Article Computer Science, Artificial Intelligence

Privacy-Preserving and Content-Protecting Location Based Queries

Russell Paulet et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)