Sheng Gao's scientific contributions

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (1)


Protection of location privacy in continuous LBSs against adversaries with background information
  • Conference Paper

February 2016

·

58 Reads

·

37 Citations

·

Sheng Gao

·

·

[...]

·

Zongqing Lu

Privacy issues in continuous Location-Based Services (LBSs) have gained attractive attentions in literature over recent years. In this paper, we illustrate the limitations of existing work and define an entropy-based privacy metric to quantify the privacy degree based on a set of vital observations. To tackle the privacy issues, we propose an efficient privacy-preserving scheme, DUMMY-T, which aims to protect LBSs user's privacy against adversaries with background information. By our Dummy Locations Generating (DLG) algorithm, we first generate a set of realistic dummy locations for each snapshot with considering the minimum cloaking region and background information. Further, our proposed Dummy Paths Constructing (DPC) algorithm guarantees the location reachability by taking the maximum distance of the moving mobile users into consideration. Security analysis and empirical evaluation results further verify the effectiveness and efficiency of our DUMMY-T.

Share

Citations (1)


... Internal and External: The internal attacker is an authenticated member or network who can send and receive messages as part of the communication range. An external adversary can eavesdrop on messages using sniffing stations[71][72][73][74][75]. ...

Reference:

Location privacy in VANETs: Provably secure anonymous key exchange protocol based on self-blindable signatures
Protection of location privacy in continuous LBSs against adversaries with background information
  • Citing Conference Paper
  • February 2016