{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:54:21Z","timestamp":1740174861879,"version":"3.37.3"},"reference-count":7,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,2,12]],"date-time":"2020-02-12T00:00:00Z","timestamp":1581465600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFC1604000\/2018YFC1604002","2017CFB663"],"award-info":[{"award-number":["2018YFC1604000\/2018YFC1604002","2017CFB663"]}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["2018YFC1604000\/2018YFC1604002","2017CFB663"],"award-info":[{"award-number":["2018YFC1604000\/2018YFC1604002","2017CFB663"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2020,2,12]]},"abstract":"<jats:p>Location-based services (LBS) have gained huge popularity because of the easy availability of modern mobile devices and the fast development of geographical information science (GIS). However, the lack of protection for private user positions might give rise to privacy concerns. This kind of problem is especially serious in mobile application environment because many mobile applications tend to use LBS. In this paper, we propose a new privacy preserving approach using customized robust cloaked region (RCR), depending on a peer-to-peer structure and the premise that users do not trust each other when sharing their geographical locations. Two algorithms are used to generate the RCR with high user density. The area of the RCR is controlled by the user\u2019s demanded degree of protection. To enhance the resistance to regional background knowledge attack, we incorporate a location semantic value into each unit of the user map. According to extensive simulations, our method can effectively obfuscate a user\u2019s geographical location into a highly indistinguishable region because of the disturbance of nearby users and different equally possible locations.<\/jats:p>","DOI":"10.1155\/2020\/3903681","type":"journal-article","created":{"date-parts":[[2020,2,12]],"date-time":"2020-02-12T18:33:08Z","timestamp":1581532388000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["An Approach Based on Customized Robust Cloaked Region for Geographic Location Information Privacy Protection"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4880-381X","authenticated-orcid":true,"given":"Zhidong","family":"Shen","sequence":"first","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430079, China"},{"name":"International School of Software, Wuhan University, Wuhan 430079, China"}]},{"given":"Siyuan","family":"Lu","sequence":"additional","affiliation":[{"name":"International School of Software, Wuhan University, Wuhan 430079, China"}]},{"given":"Huijuan","family":"Huang","sequence":"additional","affiliation":[{"name":"International School of Software, Wuhan University, Wuhan 430079, China"}]},{"given":"Meng","family":"Yuan","sequence":"additional","affiliation":[{"name":"International School of Software, Wuhan University, Wuhan 430079, China"}]},{"given":"Guoming","family":"Tang","sequence":"additional","affiliation":[{"name":"Science & Technology on Information Systems Engineering Lab, National University of Defense Technology, Changsha, China"}]},{"given":"Weiying","family":"Chen","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430079, China"}]},{"given":"Taige","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430079, China"}]},{"given":"Ting","family":"Zhong","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan 430079, China"}]}],"member":"311","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2007.190662"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-009-0099-y"},{"volume":"98","journal-title":"PODS","year":"1998","key":"16"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-008-0047-2"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1023\/a:1022491825047"},{"year":"1992","key":"27"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2020\/3903681.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2020\/3903681.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2020\/3903681.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,12]],"date-time":"2020-02-12T18:33:12Z","timestamp":1581532392000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2020\/3903681\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,12]]},"references-count":7,"alternative-id":["3903681","3903681"],"URL":"https:\/\/doi.org\/10.1155\/2020\/3903681","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"type":"print","value":"1574-017X"},{"type":"electronic","value":"1875-905X"}],"subject":[],"published":{"date-parts":[[2020,2,12]]}}}