{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,10]],"date-time":"2023-06-10T17:10:12Z","timestamp":1686417012508},"reference-count":21,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,4,1]]},"abstract":"<p>This paper examines major privacy concerns in location-based services. Most user privacy techniques are based on cloaking, which achieves location k-anonymity. The key is to reduce location resolution by ensuring that each cloaking area reported to a service provider contains at least k mobile users. However, maintaining location k-anonymity alone is inadequate when the majority of the k mobile users are interested in the same query subject. In this paper, the authors address this problem by defining a novel concept called query l-diversity, which requires diversified queries submitted from the k users. The authors propose two techniques: Expand Cloak and Hilbert Cloak to achieve query l-diversity. To show the effectiveness of the proposed techniques, they compare the improved Interval Cloak technique through extensive simulation studies. The results show that these techniques better protect user privacy.<\/p>","DOI":"10.4018\/jisp.2010040101","type":"journal-article","created":{"date-parts":[[2011,10,20]],"date-time":"2011-10-20T19:42:04Z","timestamp":1319139724000},"page":"1-18","source":"Crossref","is-referenced-by-count":3,"title":["Protecting User Privacy Better with Query l-Diversity"],"prefix":"10.4018","volume":"4","author":[{"given":"Fuyu","family":"Liu","sequence":"first","affiliation":[{"name":"University of Central Florida, USA"}]},{"given":"Kien A.","family":"Hua","sequence":"additional","affiliation":[{"name":"University of Central Florida, USA"}]}],"member":"2432","reference":[{"key":"jisp.2010040101-0","doi-asserted-by":"crossref","unstructured":"Bamba, B., Liu, L., Pesti, P., & Wang, T. (2008). Supporting anonymous location queries in mobile environments with privacygrid. In Proceeedings of WWW 2008 (pp. 237-246).","DOI":"10.21236\/ADA470490"},{"key":"jisp.2010040101-1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015231126594"},{"key":"jisp.2010040101-2","first-page":"258","article-title":"Enabling private continuous queries for revealed user locations. In","volume":"2007","author":"C.-Y.Chow","year":"2007","journal-title":"Proceedings of SSTD"},{"key":"jisp.2010040101-3","doi-asserted-by":"publisher","DOI":"10.1007\/BF00288933"},{"key":"jisp.2010040101-4","first-page":"620","article-title":"Location privacy in mobile systems: A personalized anonymization model. In","volume":"2005","author":"B.Gedik","year":"2005","journal-title":"Proceedings of ICDCS"},{"key":"jisp.2010040101-5","first-page":"758","article-title":"Fast data anonymization with low information loss. In","volume":"2007","author":"G.Ghinita","year":"2007","journal-title":"Proceedings of VLDB"},{"key":"jisp.2010040101-6","first-page":"715","article-title":"On the anonymization of sparse high-dimensional data. In","volume":"2008","author":"G.Ghinita","year":"2008","journal-title":"Proceedings of ICDE"},{"key":"jisp.2010040101-7","doi-asserted-by":"crossref","unstructured":"Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. Paper presented at MobiSys 2003.","DOI":"10.1145\/1066116.1189037"},{"key":"jisp.2010040101-8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190662"},{"key":"jisp.2010040101-9","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., & Satoh, T. (2005). Protection of location privacy using dummies for location-based services. In Proceedings of the ICDE Workshops (p. 1248).","DOI":"10.1109\/ICDE.2005.269"},{"key":"jisp.2010040101-10","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/1066157.1066164","article-title":"Incognito: Efficient full-domain k-anonymity. In","volume":"2005","author":"K.LeFevre","year":"2005","journal-title":"Proceedings of SIGMOD"},{"key":"jisp.2010040101-11","doi-asserted-by":"crossref","unstructured":"Liu, F., Hua, K. A., & Cai, Y. (2009). Query l-diversity in location based services. Paper presented at the International Workshop on Privacy-Aware Location-based Mobile Services (PALMS).","DOI":"10.1109\/MDM.2009.72"},{"key":"jisp.2010040101-12","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., & Venkitasubramaniam, M. (2006). l-diversity: Privacy beyond k-anonymity. In Proceedings of ICDE 2006 (p. 24).","DOI":"10.1109\/ICDE.2006.1"},{"key":"jisp.2010040101-13","first-page":"223","author":"A.Meyerson","year":"2004","journal-title":"On the complexity of optimal k-anonymity"},{"key":"jisp.2010040101-14","first-page":"763","author":"M. F.Mokbel","year":"2006","journal-title":"The new casper: Query processing for location services without compromising privacy"},{"key":"jisp.2010040101-15","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"jisp.2010040101-16","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"jisp.2010040101-17","first-page":"139","article-title":"Simple and effective privacy preservation","author":"X.Xiao","year":"2006","journal-title":"VLDB 2006"},{"key":"jisp.2010040101-18","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Xu, J., & Meng, X. (2008). p-sensitivity: A semantic privacy-protection model for location-based services. Paper presented at the International Workshop on Privacy-Aware Location-Based Mobile Services (PALMS 2008).","DOI":"10.1109\/MDMW.2008.20"},{"key":"jisp.2010040101-19","first-page":"39","author":"T.Xu","year":"2007","journal-title":"Location anonymity in continuous location-based services"},{"key":"jisp.2010040101-20","doi-asserted-by":"crossref","unstructured":"Xu, T., & Cai, Y. (2008). Exploring historical location data for anonymity preservation in location-based services. Paper presented at INFOCOM.","DOI":"10.1109\/INFOCOM.2008.103"}],"container-title":["International Journal of Information Security and Privacy"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=46100","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,10]],"date-time":"2023-06-10T16:46:22Z","timestamp":1686415582000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jisp.2010040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2010,4,1]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jisp.2010040101","relation":{},"ISSN":["1930-1650","1930-1669"],"issn-type":[{"value":"1930-1650","type":"print"},{"value":"1930-1669","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,4,1]]}}}