{"id":"https://openalex.org/W4313172220","doi":"https://doi.org/10.1515/comp-2022-0250","title":"Privacy protection methods of location services in big data","display_name":"Privacy protection methods of location services in big data","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4313172220","doi":"https://doi.org/10.1515/comp-2022-0250"},"language":"en","primary_location":{"id":"doi:10.1515/comp-2022-0250","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2022-0250","pdf_url":"https://www.degruyter.com/document/doi/10.1515/comp-2022-0250/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.degruyter.com/document/doi/10.1515/comp-2022-0250/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100692269","display_name":"Wenfeng Liu","orcid":"https://orcid.org/0000-0001-7568-3844"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wenfeng Liu","raw_affiliation_strings":["Student Affairs Office, Hunan College of Foreign Studies , Changsha , 410203, Hunan , China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Student Affairs Office, Hunan College of Foreign Studies , Changsha , 410203, Hunan , China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037621029","display_name":"Juanjuan Wu","orcid":"https://orcid.org/0000-0002-5918-0208"},"institutions":[{"id":"https://openalex.org/I96478251","display_name":"Hunan Institute of Technology","ror":"https://ror.org/04n3k2k71","country_code":"CN","type":"education","lineage":["https://openalex.org/I96478251"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Juanjuan Wu","raw_affiliation_strings":["School of Humanities and Arts, Hunan Institute of Transportation Engineering , Hengyang , 421000, Hunan , China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Humanities and Arts, Hunan Institute of Transportation Engineering , Hengyang , 421000, Hunan , China","institution_ids":["https://openalex.org/I96478251"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109600619","display_name":"Zhong Xi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhong Xi","raw_affiliation_strings":["College of Western Languages, Hunan College of Foreign Languages , Changsha , 410203, Hunan , China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Western Languages, Hunan College of Foreign Languages , Changsha , 410203, Hunan , China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037621029","https://openalex.org/A5100692269"],"corresponding_institution_ids":["https://openalex.org/I96478251"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.157579,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"1","first_page":"389","last_page":"402"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.944599986076355,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.8179857730865479},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7427564263343811},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.6100249886512756},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.5514546036720276},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.550086259841919},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5444943904876709},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5019030570983887},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.45599597692489624},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.45467811822891235},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3748215436935425},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2181852161884308}],"concepts":[{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.8179857730865479},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7427564263343811},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.6100249886512756},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.5514546036720276},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.550086259841919},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5444943904876709},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5019030570983887},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.45599597692489624},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.45467811822891235},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3748215436935425},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2181852161884308},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/comp-2022-0250","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2022-0250","pdf_url":"https://www.degruyter.com/document/doi/10.1515/comp-2022-0250/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5980a979880b4c6aa3f9f175cc11f359","is_oa":false,"landing_page_url":"https://doaj.org/article/5980a979880b4c6aa3f9f175cc11f359","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Open Computer Science, Vol 12, Iss 1, Pp 389-402 (2022)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/comp-2022-0250","is_oa":true,"landing_page_url":"https://doi.org/10.1515/comp-2022-0250","pdf_url":"https://www.degruyter.com/document/doi/10.1515/comp-2022-0250/pdf","source":{"id":"https://openalex.org/S4210177004","display_name":"Open Computer Science","issn_l":"2299-1093","issn":["2299-1093"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Open Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4313172220.pdf","grobid_xml":"https://content.openalex.org/works/W4313172220.grobid-xml"},"referenced_works_count":25,"referenced_works":["https://openalex.org/W2312909383","https://openalex.org/W2521191636","https://openalex.org/W2563625378","https://openalex.org/W2572023483","https://openalex.org/W2753327090","https://openalex.org/W2784047283","https://openalex.org/W2790449267","https://openalex.org/W2790602161","https://openalex.org/W2799331111","https://openalex.org/W2904753018","https://openalex.org/W2914858760","https://openalex.org/W2942139817","https://openalex.org/W2946275297","https://openalex.org/W2954386402","https://openalex.org/W2979529028","https://openalex.org/W2990661377","https://openalex.org/W3012276926","https://openalex.org/W3047317002","https://openalex.org/W3095737149","https://openalex.org/W3126358682","https://openalex.org/W3158861640","https://openalex.org/W3176895663","https://openalex.org/W3192231492","https://openalex.org/W3195752927","https://openalex.org/W4213355288"],"related_works":["https://openalex.org/W2379795947","https://openalex.org/W4311644739","https://openalex.org/W2086129702","https://openalex.org/W2050200417","https://openalex.org/W2800932586","https://openalex.org/W4225340788","https://openalex.org/W2348741079","https://openalex.org/W2349715251","https://openalex.org/W2041722016","https://openalex.org/W2161302168"],"abstract_inverted_index":{"Abstract":[0],"The":[1,50,217],"rapid":[2],"development":[3],"of":[4,22,47,52,60,67,74,87,103,116,124,135,153,171,194,207,232],"mobile":[5],"communication":[6],"technology":[7],"not":[8],"only":[9],"brings":[10,19],"convenience":[11],"and":[12,63,77,94,100,114,119,150,204,224],"fun":[13],"to":[14,33,43,56],"our":[15],"life,":[16],"but":[17],"also":[18],"a":[20,215],"series":[21],"problems":[23],"such":[24],"as":[25],"privacy":[26,36,62,69,78,91,106,126,147,158,170,184,230],"disclosure.":[27],"Therefore,":[28],"it":[29],"is":[30,55,198,211],"very":[31],"necessary":[32],"study":[34],"the":[35,45,58,65,72,85,88,97,104,112,122,133,154,168,177,182,191,205,229],"protection":[37,79,92,107,127,148,159,185,231],"method":[38,141,149],"based":[39,142],"on":[40,143],"location":[41,48,61,75,90,105,169],"service":[42],"strengthen":[44],"security":[46,59],"privacy.":[49],"purpose":[51],"this":[53],"work":[54,110],"improve":[57],"prevent":[64],"disclosure":[66],"user":[68,144],"by":[70,200,213],"studying":[71],"characteristics":[73,86,99],"services":[76],"methods.":[80],"This":[81,109],"article":[82],"first":[83],"describes":[84],"important":[89],"law,":[93],"then":[95],"studies":[96],"structural":[98],"operation":[101],"process":[102],"law.":[108],"evaluates":[111],"advantages":[113],"disadvantages":[115],"different":[117],"methods,":[118],"finally":[120],"compares":[121],"performance":[123],"several":[125],"algorithms":[128],"through":[129],"experimental":[130,151],"analysis.":[131],"Through":[132],"research":[134],"hiding":[136],"space":[137,179,197,210],"method,":[138],"two-level":[139],"cache":[140],"grid,":[145],"differential":[146],"analysis":[152],"algorithm,":[155],"an":[156],"effective":[157],"algorithm":[160,180,218],"can":[161,165],"be":[162],"obtained.":[163],"It":[164,219],"better":[166],"protect":[167],"users.":[172,233],"For":[173],"example,":[174],"dual-active":[175],"in":[176,228],"hidden":[178,196,209],"has":[181,220],"best":[183],"performance.":[186],"Compared":[187],"with":[188],"other":[189],"algorithms,":[190],"success":[192],"rate":[193],"generating":[195,208],"increased":[199],"more":[201],"than":[202],"10%,":[203],"time":[206],"shortened":[212],"about":[214],"quarter.":[216],"certain":[221],"practical":[222],"value":[223],"significance":[225],"for":[226],"use":[227]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2023-01-06T00:00:00"}
