{"id":"https://openalex.org/W2069607022","doi":"https://doi.org/10.1109/mdm.2010.82","title":"In-Device Spatial Cloaking for Mobile User Privacy Assisted by the Cloud","display_name":"In-Device Spatial Cloaking for Mobile User Privacy Assisted by the Cloud","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W2069607022","doi":"https://doi.org/10.1109/mdm.2010.82","mag":"2069607022"},"language":"en","primary_location":{"id":"doi:10.1109/mdm.2010.82","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mdm.2010.82","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Eleventh International Conference on Mobile Data Management","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101581312","display_name":"Song Wang","orcid":"https://orcid.org/0000-0002-9059-1726"},"institutions":[{"id":"https://openalex.org/I111236770","display_name":"University of Vermont","ror":"https://ror.org/0155zta11","country_code":"US","type":"education","lineage":["https://openalex.org/I111236770"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Song Wang","raw_affiliation_strings":["Department of Computer Science, University of Vermont, Burlington, VT, USA","Department of Computer Science, University of Vermont, Burlington VT, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Vermont, Burlington, VT, USA","institution_ids":["https://openalex.org/I111236770"]},{"raw_affiliation_string":"Department of Computer Science, University of Vermont, Burlington VT, USA","institution_ids":["https://openalex.org/I111236770"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023138665","display_name":"X. Sean Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I111236770","display_name":"University of Vermont","ror":"https://ror.org/0155zta11","country_code":"US","type":"education","lineage":["https://openalex.org/I111236770"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"X. Sean Wang","raw_affiliation_strings":["Department of Computer Science, University of Vermont, Burlington, VT, USA","Department of Computer Science, University of Vermont, Burlington VT, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Vermont, Burlington, VT, USA","institution_ids":["https://openalex.org/I111236770"]},{"raw_affiliation_string":"Department of Computer Science, University of Vermont, Burlington VT, USA","institution_ids":["https://openalex.org/I111236770"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101581312"],"corresponding_institution_ids":["https://openalex.org/I111236770"],"apc_list":null,"apc_paid":null,"fwci":8.5698,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.97663569,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"381","last_page":"386"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloaking","display_name":"Cloaking","score":0.8329812288284302},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7034549713134766},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6697169542312622},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.44150933623313904},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3817810118198395},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3599897027015686},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3306873142719269},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2330610454082489},{"id":"https://openalex.org/keywords/optoelectronics","display_name":"Optoelectronics","score":0.09433746337890625},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.07425174117088318},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.06034943461418152}],"concepts":[{"id":"https://openalex.org/C62973154","wikidata":"https://www.wikidata.org/wiki/Q868018","display_name":"Cloaking","level":3,"score":0.8329812288284302},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7034549713134766},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6697169542312622},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.44150933623313904},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3817810118198395},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3599897027015686},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3306873142719269},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2330610454082489},{"id":"https://openalex.org/C49040817","wikidata":"https://www.wikidata.org/wiki/Q193091","display_name":"Optoelectronics","level":1,"score":0.09433746337890625},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.07425174117088318},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.06034943461418152},{"id":"https://openalex.org/C110367647","wikidata":"https://www.wikidata.org/wiki/Q497166","display_name":"Metamaterial","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mdm.2010.82","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mdm.2010.82","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Eleventh International Conference on Mobile Data Management","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W20023138","https://openalex.org/W1971472627","https://openalex.org/W2056773559","https://openalex.org/W2074149673","https://openalex.org/W2089959302","https://openalex.org/W2096899416","https://openalex.org/W2101024939","https://openalex.org/W2159024459","https://openalex.org/W2162614120","https://openalex.org/W6600852038","https://openalex.org/W6669007072","https://openalex.org/W6673414462"],"related_works":["https://openalex.org/W2051529116","https://openalex.org/W2951033480","https://openalex.org/W2953300811","https://openalex.org/W2095170444","https://openalex.org/W2783338065","https://openalex.org/W3014040989","https://openalex.org/W4289329992","https://openalex.org/W2167779058","https://openalex.org/W2224797136","https://openalex.org/W2011442434"],"abstract_inverted_index":{"Spatial":[0],"cloaking":[1,20,65,106,211,250],"has":[2],"been":[3],"proposed":[4],"and":[5,62,89,229,234,242],"studied":[6],"to":[7,35,52,137,150,175,186,192,195,201,218,223],"protect":[8],"mobile":[9],"user":[10,68,164,177,198],"privacy":[11,83],"when":[12],"using":[13],"location":[14,31,55,165],"based":[15],"services":[16],"(LBS).":[17],"Traditional":[18],"spatial":[19,105,203,210],"methods":[21,212],"are":[22,71,135],"carried":[23],"out":[24],"by":[25],"a":[26,37,72,79,183,231],"trusted":[27,32],"proxy":[28],"known":[29],"as":[30,214],"server":[33],"(LTS)":[34],"generate":[36],"region":[38],"that":[39,93,116,152,258],"contains":[40],"at":[41,59,122,247],"least":[42],"k":[43],"users":[44,58],"for":[45,66,82,167,179],"every":[46],"request.":[47],"The":[48],"LTS":[49],"is":[50,115,155],"assumed":[51],"know":[53],"the":[54,64,86,90,112,117,123,126,128,189,193,239,259,265],"of":[56,74,76,125,130,238],"all":[57,60,67,131],"times,":[61],"perform":[63,202],"requests.":[69],"There":[70],"number":[73],"disadvantages":[75],"relying":[77],"on":[78],"single":[80],"service":[81,95],"preservation,":[84],"including":[85],"scalability":[87],"concern":[88],"appropriate":[91,140,149,197],"worry":[92],"this":[94,101,206],"\u201cknows":[96],"too":[97],"much\u201d.":[98],"To":[99],"ameliorate":[100],"single-service":[102],"problem,":[103],"in-device":[104],"may":[107,147,162,171],"be":[108,148,187,219],"more":[109],"desirable.":[110],"However,":[111],"sticky":[113],"problem":[114],"device":[118,190],"does":[119],"not":[120],"know,":[121],"time":[124],"request,":[127],"locations":[129],"other":[132],"users,":[133],"which":[134],"necessary":[136],"obtain":[138],"an":[139],"cloaked":[141],"region.":[142],"With":[143],"cloud":[144,158,194],"services,":[145],"it":[146],"assume":[151],"user-density":[153],"information":[154,166,200],"available":[156],"from":[157],"servers.":[159],"These":[160],"servers":[161],"collect":[163],"different":[168,180],"regions,":[169],"or":[170],"use":[172],"sophisticated":[173],"method":[174],"estimate":[176],"densities":[178],"places.":[181],"When":[182],"request":[184],"needs":[185],"anonymized,":[188],"goes":[191],"acquire":[196],"density":[199],"cloaking.":[204],"In":[205],"operating":[207],"environment,":[208],"traditional":[209],"such":[213],"Casper":[215],"[9]":[216],"need":[217],"modified":[220],"in":[221,264],"order":[222],"guarantee":[224],"safety.":[225],"This":[226],"paper":[227],"proposes":[228],"studies":[230],"new":[232,240,260],"algorithm":[233,241],"reports":[235],"performance":[236],"evaluation":[237,267],"its":[243],"optimized":[244],"version,":[245],"aiming":[246],"provably":[248],"safe":[249],"with":[251],"minimized":[252],"communication":[253],"cost.":[254],"Experimental":[255],"results":[256],"show":[257],"algorithms":[261],"work":[262],"well":[263],"realistic":[266],"environment.":[268]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":13},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
