[go: up one dir, main page]

Eltarjaman et al., 2016 - Google Patents

Private retrieval of POI details in top-K queries

Eltarjaman et al., 2016

View PDF
Document ID
8575329300867501953
Author
Eltarjaman W
Dewri R
Thurimella R
Publication year
Publication venue
IEEE Transactions on Mobile Computing

External Links

Snippet

Location privacy preservation algorithms in the context of location-based services have evolved in the recent years. However, a majority of the proposals assume that points of interests (POI) are ranked only by distance, and demand extensive architectural changes. As …
Continue reading at cs.du.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • G06F17/30424Query processing
    • G06F17/30533Other types of queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • G06F17/30321Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network

Similar Documents

Publication Publication Date Title
Dong et al. Novel privacy-preserving algorithm based on frequent path for trajectory data publishing
Ni et al. An anonymous entropy-based location privacy protection scheme in mobile social networks
US10515077B2 (en) Execution optimization of database statements involving encrypted data
US9305019B2 (en) Method of associating user related data with spatial hierarchy identifiers for efficient location-based processing
CN108009933B (en) Graph centrality calculation method and device
Alrahhal et al. AES-route server model for location based services in road networks
Liu et al. A cloud‐based taxi trace mining framework for smart city
Miao et al. Differential privacy–based location privacy enhancing in edge computing
Zhang et al. A differentially private indoor localization scheme with fusion of WiFi and bluetooth fingerprints in edge computing
Miao et al. Task assignment with efficient federated preference learning in spatial crowdsourcing
Eltarjaman et al. Private retrieval of POI details in top-K queries
Li et al. DALP: A demand‐aware location privacy protection scheme in continuous location‐based services
JP7267471B2 (en) Secure management of data distribution restrictions
US11979309B2 (en) System and method for discovering ad-hoc communities over large-scale implicit networks by wave relaxation
Ravi et al. SECRECSY: A secure framework for enhanced privacy-preserving location recommendations in cloud environment
Song et al. Achieving efficient and privacy-preserving location-based task recommendation in spatial crowdsourcing
Li et al. Secure semantic-aware search over dynamic spatial data in VANETs
Yao et al. FedRKG: A privacy-preserving federated recommendation framework via knowledge graph enhancement
CN113779370B (en) Address retrieval method and device
Zhang et al. LPPS‐AGC: Location Privacy Protection Strategy Based on Alt‐Geohash Coding in Location‐Based Services
Cheng et al. Enabling secure and efficient kNN query processing over encrypted spatial data in the cloud
Gao et al. A privacy-preserving framework for subgraph pattern matching in cloud
Dewri et al. Mobile local search with noisy locations
Zhang et al. A Context‐Aware Location Differential Perturbation Scheme for Privacy‐Aware Users in Mobile Environment
Zhao et al. EPLA: efficient personal location anonymity