Comprehensive review: Privacy protection of user in location-aware services of mobile cloud computing

Z A. Almusaylim, NZ Jhanjhi - Wireless Personal Communications, 2020 - Springer
One of the recent trends of networking and mobile technology is mobile cloud computing
(MCC) that provides rich computational, storage resources and services in clouds to mobile …

A privacy-preserving mechanism based on local differential privacy in edge computing

M Bi, Y Wang, Z Cai, X Tong - China Communications, 2020 - ieeexplore.ieee.org
With the development of Internet of Things (IoT), the delay caused by network transmission
has led to low data processing efficiency. At the same time, the limited computing power and …

Positioning information privacy in intelligent transportation systems: An overview and future perspective

A Ometov, S Bezzateev, V Davydov, A Shchesniak… - Sensors, 2019 - mdpi.com
Today, the Intelligent Transportation Systems (ITS) are already in deep integration phase all
over the world. One of the most significant enablers for ITS are vehicle positioning and …

Use of homomorphic encryption with GPS in location privacy

S Gupta, G Arora - 2019 4th International Conference on …, 2019 - ieeexplore.ieee.org
Homomorphic Encryption is not a widely used encryption technique because it has a lot of
drawbacks. It is very slow in performance and lacks efficiency. This makes its application …

Many-to-many matching based task allocation for dispersed computing

H Hui, F Lin, L Meng, L Yang, X Zhou - Computing, 2023 - Springer
Dispersed computing is a new resource-centric computing paradigm, which makes use of
idle resources in the network to complete the tasks. Effectively allocating tasks between task …

[PDF][PDF] Using homomorphic cryptographic solutions on e-voting systems

AAA Aziz, HN Qunoo, AAA Samra - International Journal of …, 2018 - researchgate.net
Homomorphic Cryptography raised as a new solution used in electronic voting systems. In
this research, Fully Homomorphic encryption used to design and implement an e-voting …

GLPS: A Geohash-Based Location Privacy Protection Scheme

B Liu, C Zhang, L Yao, Y Xin - Entropy, 2023 - mdpi.com
With the development of mobile applications, location-based services (LBSs) have been
incorporated into people's daily lives and created huge commercial revenues. However …

Cloud security: the future of data storage

P Bajaj, R Arora, M Khurana, S Mahajan - Cyber Security and Digital …, 2022 - Springer
In this modern era, all the organizations seem to be shifting their data and services to cloud
because of the increase in information leaks and data thefts. It has become easier for …

Privacy-Preserving Location Sharing via LWE-based Private Information Retrieval

Q Xue, T Cui - 2023 8th International Conference on Intelligent …, 2023 - ieeexplore.ieee.org
We proposes a privacy-preserving location sharing scheme based on Learning with Errors
(LWE) encryption, emphasizing its ability to resist quantum computing attacks and provide a …

Анализ протокола анонимного вычисления точек интереса пользователя на основе сегментации карты привязки

ЕА Серёжин, ВА Яковлев - … в науке и образовании (АПИНО 2020), 2020 - elibrary.ru
Проведен анализ протокола скрытого определения местоположения точек интереса
мобильного пользователя с учетом типа POI, с использованием гомоморфных …