298 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author박용수-
dc.date.accessioned2018-04-16T01:11:55Z-
dc.date.available2018-04-16T01:11:55Z-
dc.date.issued2012-07-
dc.identifier.citationJournal of Internet Technology, 2012, 13(4), P.645~653en_US
dc.identifier.issn1607-9264-
dc.identifier.urihttp://www.airitilibrary.com/Publication/alDetailedMesh?DocID=16079264-201207-201207300003-201207300003-645-653-
dc.identifier.urihttp://hdl.handle.net/20.500.11754/67240-
dc.description.abstractThe rapid growth of smart phones has made locationbased services (LBS) widely available. LBS can be used to enhance ”Homeland Security.” Since the use of LBS can raise privacy issues, users want to prevent government agencies from tracking their locations. To avoid such a situation, some kind of location privacy mechanism should be provided. Most of the studies for location privacy try to preserve location privacy by achieving what is known as location K-anonymity. However, location K-anonymity can be compromised even when there are always more than K users in the anonymizing spatial regions (ASR). A reciprocity property is introduced as a sufficient condition for location K-anonymity. In this paper, we propose a hierarchical clustering-based spatial cloaking algorithm for LBS. Our spatial cloaking algorithm satisfies the reciprocity property. The experimental results show, in terms of the ASR size, that the proposed algorithm is better than Hilbert Cloak and comparable to RC-AR. In terms of the ASR generation time, the proposed algorithm is much better in its performance than RC-AR and similar in performance to Hilbert Cloak.en_US
dc.language.isoenen_US
dc.publisherThe Journal of the Korea Institute of Electronic Communication Sciencesen_US
dc.subjectPrivacyen_US
dc.subjectLocation-Based servicesen_US
dc.subjectHomeland securityen_US
dc.subjectHierarchical clusteringen_US
dc.titleA Hierarchical Clustering-Based Spatial Cloaking Algorithm for Location-Based Servicesen_US
dc.typeArticleen_US
dc.relation.volume13-
dc.identifier.doi10.6138/JIT.2012.13.4.12-
dc.relation.page645-653-
dc.relation.journalJOURNAL OF INTERNET TECHNOLOGY-
dc.contributor.googleauthorJaeheung, Lee-
dc.contributor.googleauthorSeokhyun, Kim-
dc.contributor.googleauthorYookun, Cho-
dc.contributor.googleauthorYoojin, Chung-
dc.contributor.googleauthorYongsu, Park-
dc.relation.code2012217525-
dc.sector.campusS-
dc.sector.daehakCOLLEGE OF ENGINEERING[S]-
dc.sector.departmentDEPARTMENT OF COMPUTER SCIENCE-
dc.identifier.pidyongsu-
Appears in Collections:
COLLEGE OF ENGINEERING[S](공과대학) > COMPUTER SCIENCE(컴퓨터소프트웨어학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE