期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
A Framework of Web Data Integrated LBS Middleware
1
作者 MENG Xiaofeng YIN Shaoyi XIAO Zhen 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1187-1191,共5页
In this paper, we propose a flexible locationbased service (LBS) middleware framework to make the development and deployment of new location based applications much easier. Considering the World Wide Web as a huge d... In this paper, we propose a flexible locationbased service (LBS) middleware framework to make the development and deployment of new location based applications much easier. Considering the World Wide Web as a huge data source of location relative information, we integrate the common used web data extraction techniques into the middleware framework, exposing a unified web data interface for the upper applications to make them more attractive. Besides, the framework also emphasizes some common LBS issues, including positioning, location modeling, location-dependent query processing, privacy and secure management. 展开更多
关键词 location-based service (lbs) MIDDLEWARE web data extraction
下载PDF
Representation and Organization for Spatial Data in LBS 被引量:1
2
作者 Yanhui Wang Yue Li 《Journal of Earth Science》 SCIE CAS CSCD 2014年第3期544-549,共6页
Aiming at the special demand on SVG_based representation and organization for spatial data in location based services(LBS), the research is made in this article on the conversion method from multiple formats to SVG ... Aiming at the special demand on SVG_based representation and organization for spatial data in location based services(LBS), the research is made in this article on the conversion method from multiple formats to SVG format, and a harris_corner detector method is proposed and verified to evaluate the conversion result. Based on the above, an optimized compression arithmetic is proposed, which integrated the characteristic of code simplification and GZIP compression. The test shows that the techniques on conversion and compression are feasible, which means that SVG_based representation is suited for spatial data in LBS and the improved compression arithmetic is prior to the former. 展开更多
关键词 location based services(lbs) scalable vector graphic(SVG) conversion method harris_corner detector optimized compression arithmetic.
原文传递
Location,Localization,and Localizability 被引量:36
3
作者 刘云浩 杨铮 +1 位作者 王小平 简丽荣 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第2期274-297,共24页
Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, pro- duction, commence, and public services. This article provides an overview of the location, localization, and ... Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, pro- duction, commence, and public services. This article provides an overview of the location, localization, and localizability issues of wireless ad-hoc and sensor networks. Making data geographically meaningful, location information is essential for many applications, and it deeply aids a number of network functions, such as network routing, topology control, coverage, boundary detection, clustering, etc. We investigate a large body of existing localization approaches with focuses on error control and network localizability, the two rising aspects that attract significant research interests in recent years. Error control aims to alleviate the negative impact of noisy ranging measurement and the error accumulation effect during coope- rative localization process. Network localizability provides theoretical analysis on the performance of localization approaches, providing guidance on network configuration and adjustment. We emphasize the basic principles of localization to under- stand the state-of-the-art and to address directions of future research in the new and largely open areas of location-aware technologies. 展开更多
关键词 location-based services (lbs) LOCALIZATION error control localizability wireless ad-hoc and sensor networks
原文传递
An efficient method for privacy preserving location queries 被引量:5
4
作者 Yubao LIU Xiuwei CHEN +2 位作者 Zhan LI Zhijie LI Raymond Chi-Wing WONG 《Frontiers of Computer Science》 SCIE EI CSCD 2012年第4期409-420,共12页
Recently, the issue of privacy preserving loca- tion queries has attracted much research. However, there are few works focusing on the tradeoff between location privacy preservation and location query information coll... Recently, the issue of privacy preserving loca- tion queries has attracted much research. However, there are few works focusing on the tradeoff between location privacy preservation and location query information collection. To tackle this kind of tradeoff, we propose the privacy persevering location query (PLQ), an efficient privacy pre-serving location query processing framework. This frame- work can enable the location-based query without revealing user location information. The framework can also facilitate location-based service providers to collect some information about the location based query, which is useful in practice. PLQ consists of three key components, namely, the location anonymizer at the client side, the privacy query processor at the server side, and an additional trusted third party connect- ing the client and server. The location anonymizer blurs the user location into a cloaked area based on a map-hierarchy. The map-hierarchy contains accurate regions that are parti- tioned according to real landforms. The privacy query pro- cessor deals with the requested nearest-neighbor (NN) loca- tion based query. A new convex hull of polygon (CHP) algo- rithm is proposed for nearest-neighbor queries using a poly- gon cloaked area. The experimental results show that our al- gorithms can efficiently process location based queries. 展开更多
关键词 location based service (lbs) privacy preserva- tion nearest-neighbor (NN) location query
原文传递
A Random Anonymity Framework for Location Privacy 被引量:1
5
作者 YANG Songtao YIN Guisheng MA Chunguang 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第6期521-529,共9页
Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle i... Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle in geographic space is a severe problem since adversaries will surely regard these constraints. A novel framework is proposed to enhance location-dependent queries, based on the theoretical work of k-anonymity and Voronoi diagrams, allows a user to express service requirement and privacy require- ment by specifying a region and an appropriate value ofk. A trusted anonymity server form a restricted set (k, r, s), which is composed of a number of discrete points to meet the requirements for location k-anonymity and location /-diversity. The location-based services (LBS) server implements an efficient algorithm for continu- ous-region-query processing. Simulation results demonstrated that the framework is superior to previous works in terms of privacy. Moreover, discreteness and randomness of the anonymous set are conducive to resisting location tracking attacks. 展开更多
关键词 data privacy location-based services(lbs) trusted third party K-ANONYMITY
原文传递
Research on k-anonymity privacy protection scheme based on bilinear pairings 被引量:1
6
作者 Song Cheng Zhang Yadong +1 位作者 Wang Lei Liu Zhizhong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2018年第5期12-19,共8页
Aimed at enhancing privacy protection of location-based services( LBS) in mobile Internet environment,an improved privacy scheme of high service quality on the basis of bilinear pairings theory and k-anonymity is pr... Aimed at enhancing privacy protection of location-based services( LBS) in mobile Internet environment,an improved privacy scheme of high service quality on the basis of bilinear pairings theory and k-anonymity is proposed. In circular region of Euclidian distance,mobile terminal evenly generates some false locations,from which half optimal false locations are screened out according to position entropy,location and mapping background information. The anonymity obtains the effective guarantee,so as to realize privacy protection. Through security analyses,the scheme is proved not only to be able to realize such security features as privacy,anonymity and nonforgeability,but also able to resist query tracing attack. And the result of simulation shows that this scheme not only has better evenness in selecting false locations,but also improves efficiency in generating and selecting false nodes. 展开更多
关键词 location-based services (lbs) bilinear pairings K-ANONYMITY privacy protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部