By Topic

A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Chi Lin ; Sch. of Software, Dalian Univ. of Technol., Dalian, China ; Guowei Wu ; Lin Yao ; Zuosong Liu

Privacy protection in pervasive environments has attracted great interests in recent years. Two kinds of privacy issues, location privacy and query privacy, are threatening the security of the users. In this paper, a novel combined clustering algorithm for protecting location privacy and query privacy, namely ECC, is proposed. ECC applies a iterative K-means clustering method to group the user requests into clusters for providing location safety while utilizing a hierarchical clustering method for preserving the query privacy. ECC provides the mobile users with their desired anonymity levels and spatial tolerances. Experimental results manifest that the ECC algorithm shows merits in shorter cloaking time and is able to preserve location privacy and query privacy in continuous location based services.

Published in:

2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications

Date of Conference:

25-27 June 2012