{"title":"Research on LBS privacy protection technology in mobile social networks","authors":"Wen He","doi":"10.1109/IAEAC.2017.8053979","DOIUrl":null,"url":null,"abstract":"With the rapid development of mobile Internet and locating technology, location-based services (LBS) are widely used in mobile social networks, while the user obtained the LBS services, their location information is also provided to the service provider, this information may be obtained by the attacker and the user's other personal privacy may be inferred, threatening to the user's personal information security. Based on the location privacy protection of LBS services, this paper analyzes the method and model of user's location privacy protection, and introduces some location privacy protection technologies and trajectory privacy protection technologies in LBS.","PeriodicalId":432109,"journal":{"name":"2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IAEAC.2017.8053979","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
With the rapid development of mobile Internet and locating technology, location-based services (LBS) are widely used in mobile social networks, while the user obtained the LBS services, their location information is also provided to the service provider, this information may be obtained by the attacker and the user's other personal privacy may be inferred, threatening to the user's personal information security. Based on the location privacy protection of LBS services, this paper analyzes the method and model of user's location privacy protection, and introduces some location privacy protection technologies and trajectory privacy protection technologies in LBS.