{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:05:57Z","timestamp":1721865957199},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,11,28]],"date-time":"2014-11-28T00:00:00Z","timestamp":1417132800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2014,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>With the development of mobile internet, protecting location privacy has already been an important issue. Based on previous studies and the drawback of traditional algorithms, the paper proposes a novel algorithm for protecting location privacy. The algorithm is based on the voronoi map of a road network, considers the problem of side-weight inference, and utilizes the information entropy as metrics. Meanwhile, the algorithm can defense the attack of side-weight inference and replay. Lastly, we verified the algorithm based on the real data of the road network. Results of experiences show that the improved algorithm has the better performance on some key performance metrics.<\/jats:p>","DOI":"10.1186\/1687-1499-2014-202","type":"journal-article","created":{"date-parts":[[2014,11,28]],"date-time":"2014-11-28T15:45:44Z","timestamp":1417189544000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The research for protecting location privacy based on V-W algorithm"],"prefix":"10.1186","volume":"2014","author":[{"given":"Xinyue","family":"Fan","sequence":"first","affiliation":[]},{"given":"Jing","family":"Tu","sequence":"additional","affiliation":[]},{"given":"Chaolong","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,28]]},"reference":[{"key":"1073_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/11957454_23","volume-title":"Proceedings of Privacy Enhancing Technologies: 28-30 June 2006; Cambridge","author":"R Cheng","year":"2006","unstructured":"Cheng R, Zhang Y, Bertino E, Prabhakar S: Preserving user location privacy in mobile data management infrastructures. In Proceedings of Privacy Enhancing Technologies: 28-30 June 2006; Cambridge. Edited by: Danezis G, Golle P. Springer,, Berlin Heidelberg; 2006:393-412."},{"key":"1073_CR2","first-page":"119","volume-title":"Proceedings of the 2010 International Conference on Computer and Communication Technology: 17-19 September 2010; Allahabad","author":"A Aryan","year":"2010","unstructured":"Aryan A, Singh S: Protecting location privacy in augmented reality using k-anonymization and pseudo-id. In Proceedings of the 2010 International Conference on Computer and Communication Technology: 17-19 September 2010; Allahabad. IEEE,, Piscataway; 2010:119-124."},{"key":"1073_CR3","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/990064.990087","volume-title":"Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services: 6-9 June 2004; Boston","author":"JI Hong","year":"2004","unstructured":"Hong JI, Landay JA: An architecture for privacy-sensitive ubiquitous computing. In Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services:6\u20139June 2004; Boston. ACM, New York; 2004:177-189."},{"key":"1073_CR4","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/ICDE.2008.4497445","volume-title":"Proceedings of the 2008 IEEE 24th International Conference on Data Engineering: 7-12 April 2008; Cancun","author":"ML Yiu","year":"2008","unstructured":"Yiu ML, Jensen CS, Huang XG, Lu H: SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In Proceedings of the 2008 IEEE 24th International Conference on Data Engineering: 7-12 April 2008; Cancun. ACM,, New York; 2008:366-375."},{"issue":"1","key":"1073_CR5","first-page":"157","volume":"39","author":"YF Xiao","year":"2013","unstructured":"Xiao YF, Xu HY: A location privacy protection method based on anonymous region transformation. Comput. Eng 2013, 39(1):157-163.","journal-title":"Comput. Eng"},{"key":"1073_CR6","first-page":"16","volume-title":"Proceedings of the 7th ACM International Workshop on Data Engineering for Wireless and Mobile Access: 9-12 June 2008; Vancouver","author":"H Lu","year":"2008","unstructured":"Lu H, Jensen CS, Yiu ML: Pad: privacy-area aware, dummy-based location privacy in mobile services. In Proceedings of the 7th ACM International Workshop on Data Engineering for Wireless and Mobile Access: 9-12 June 2008; Vancouver. ACM,, New York; 2008:16-23."},{"key":"1073_CR7","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/PERSER.2005.1506394","volume-title":"Proceedings of the 2nd International Conference on Pervasive Services: 11-14 July 2005; Santorini","author":"H Kido","year":"2005","unstructured":"Kido H, Yanagisawa Y, Satoh T: An anonymous communication technique using dummies for location-based services. In Proceedings of the 2nd International Conference on Pervasive Services: 11-14 July 2005; Santorini. IEEE,, Piscataway; 2005:88-97."},{"key":"1073_CR8","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1066116.1189037","volume-title":"Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services: 5-8 May 2003; San Francisco","author":"M Gruteser","year":"2003","unstructured":"Gruteser M, Grunwald D: Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services:5\u20138May 2003; San Francisco. ACM,, New York; 2003:31-42."},{"key":"1073_CR9","first-page":"1","volume-title":"Proceedings of the International Conference on Distributed Computing Systems: 6-10 June 2005; Columbus","author":"B Gedik","year":"2005","unstructured":"Gedik B, Liu L: A customizable k-anonymity model for protecting location privacy. In Proceedings of the International Conference on Distributed Computing Systems: 6-10 June 2005; Columbus. Georgia Institute of Technology, Georgia; 2005:1-12."},{"issue":"1","key":"1073_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik B, Liu L: Protecting location privacy with personalized k-anonymity: architecture and algorithms. Mobile Comput 2008, 7(1):1-18.","journal-title":"Mobile Comput"},{"issue":"33","key":"1073_CR11","first-page":"434","volume":"10","author":"Z Xiao","year":"2007","unstructured":"Xiao Z, Meng XF, Xu JL: Quality aware privacy protection for location-based services. Adv. Database: Concepts Syst. Appl 2007, 10(33):434-446.","journal-title":"Adv. Database: Concepts Syst. Appl"},{"key":"1073_CR12","first-page":"736","volume-title":"Proceedings of the 32nd International Conference on Very Large Data Bases: 12-15 September 2006; Seoul","author":"MF Mokbel","year":"2006","unstructured":"Mokbel MF, Chow CY, Aref WG: The new casper:query processing for location services without compromising privacy. In Proceedings of the 32nd International Conference on Very Large Data Bases: 12-15 September 2006; Seoul. Edited by: Dayal U, Whang KY, Lomet D, Alonso G, Lohman G, Kersten M, Cha SK, Kim YK. ACM,, New York; 2006:736-774."},{"issue":"2","key":"1073_CR13","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1023\/A:1026543900054","volume":"40","author":"Y Rubner","year":"2000","unstructured":"Rubner Y, Tomasi C, Guibas LJ: The earth mover\u2019s distance as a metric for image retrieval. Comput. Vis 2000, 40(2):99-121. 10.1023\/A:1026543900054","journal-title":"Comput. Vis"},{"key":"1073_CR14","first-page":"1042","volume-title":"Proceeding of the 35th International Conference on Vary Large Data Bases: 24-28 August 2009; Lyon","author":"T Wang","year":"2009","unstructured":"Wang T, Liu L: Privacy-aware mobile services over road networks. In Proceeding of the 35th International Conference on Vary Large Data Bases: 24-28 August 2009; Lyon. ACM,, New York; 2009:1042-1053."},{"issue":"5","key":"1073_CR15","doi-asserted-by":"publisher","first-page":"865","DOI":"10.3724\/SP.J.1016.2011.00865","volume":"34","author":"J Xue","year":"2011","unstructured":"Xue J, Liu XY, Yang XC, Wang B: A location privacy preserving approach on road network. Chin. J. Comput 2011, 34(5):865-878. 10.3724\/SP.J.1016.2011.00865","journal-title":"Chin. J. Comput"},{"issue":"3","key":"1073_CR16","first-page":"429","volume":"45","author":"J Xu","year":"2011","unstructured":"Xu J, Xu M, Lin X, Zheng N: Location privacy protection through anonymous cells in road network. J. Zhe Jiang University (Engineering science) 2011, 45(3):429-434.","journal-title":"J. Zhe Jiang University (Engineering science)"},{"issue":"7","key":"1073_CR17","first-page":"116","volume":"40","author":"P Zhao","year":"2013","unstructured":"Zhao P, Ma CG, Gao XB, Zhu W: Protecting location privacy with voronoi diagram over road networks. Comput. Sci 2013, 40(7):116-120.","journal-title":"Comput. Sci"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-202.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2014-202\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-202.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T10:37:34Z","timestamp":1630579054000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2014-202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,28]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["1073"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2014-202","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,28]]},"assertion":[{"value":"25 June 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 October 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"202"}}