{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:54:10Z","timestamp":1740174850336,"version":"3.37.3"},"reference-count":18,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>The prevalent usage of location based services, where getting any service is solely based on the user\u2019s current location, has raised an extreme concern over location privacy of the user. Generalized approaches dealing with location privacy, referred to as cloaking and obfuscation, are mainly based on a trusted third party, in which all the data remain available at a central server and thus complete knowledge of the query exists at the central node. This is the major limitation of such approaches; on the other hand, in trusted third-party-free framework clients collaborate with each other and freely communicate with the service provider without any third-party involvement. Measuring and evaluating trust among peers is a crucial aspect in trusted third-party-free framework. This paper exploits the merits and mitigating the shortcomings of both of these approaches. We propose a hybrid solution, HYB, to achieve location privacy for the mobile users who use location services frequently. The proposed HYB scheme is based on the collaborative preprocessing of location data and utilizes the benefits of homomorphic encryption technique. Location privacy is achieved at two levels, namely, at the<jats:italic> proximity<\/jats:italic> level and at<jats:italic> distant<\/jats:italic> level. The proposed HYB solution preserves the user\u2019s location privacy effectively under specific, pull-based, sporadic query scenario.<\/jats:p>","DOI":"10.1155\/2017\/2189646","type":"journal-article","created":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T17:02:35Z","timestamp":1497805355000},"page":"1-11","source":"Crossref","is-referenced-by-count":12,"title":["A Hybrid Location Privacy Solution for Mobile LBS"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7170-066X","authenticated-orcid":true,"given":"Ruchika","family":"Gupta","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, National Institute of Technology, Surat, Gujarat 395007, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2372-4138","authenticated-orcid":true,"given":"Udai Pratap","family":"Rao","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, National Institute of Technology, Surat, Gujarat 395007, India"}]}],"member":"311","reference":[{"year":"1987","key":"1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/127072"},{"first-page":"127","volume-title":"Inference attacks on location tracks","year":"2007","key":"4"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/6182769"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2007.190662"},{"first-page":"221","volume-title":"Mobihide: a mobilea peerto-peer system for anonymous location-based queries","year":"2007","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/979201"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/5850670"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2007.071007"},{"first-page":"171","volume-title":"Security and privacy in vehicular networks","year":"2015","key":"14"},{"journal-title":"Cognitive Vehicular Networks","first-page":"151","year":"2016","key":"15"},{"first-page":"273","volume-title":"Privacy by designprinciples of privacy-aware ubiquitous systems","year":"2001","key":"17"},{"year":"2004","key":"21"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.25"},{"first-page":"59","volume-title":"Private information retrieval techniques for enabling location privacy in location-based services","year":"2009","key":"25"},{"first-page":"106","volume-title":"Microaggregation for database and location privacy","year":"2006","key":"26"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.007"},{"first-page":"119","volume-title":"A generalisation, a simplification and some applications of Paillier's probabilistic public-key system","year":"2001","key":"31"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/2189646.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/2189646.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/2189646.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T17:02:36Z","timestamp":1497805356000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2017\/2189646\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":18,"alternative-id":["2189646","2189646"],"URL":"https:\/\/doi.org\/10.1155\/2017\/2189646","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"type":"print","value":"1574-017X"},{"type":"electronic","value":"1875-905X"}],"subject":[],"published":{"date-parts":[[2017]]}}}