<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1870-9044</journal-id>
<journal-title><![CDATA[Polibits]]></journal-title>
<abbrev-journal-title><![CDATA[Polibits]]></abbrev-journal-title>
<issn>1870-9044</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Innovación y Desarrollo Tecnológico en Cómputo]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1870-90442015000200007</article-id>
<article-id pub-id-type="doi">10.17562/PB-52-6</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Location Privacy-Aware Nearest-Neighbor Query with Complex Cloaked Regions]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Khanh Dang]]></surname>
<given-names><![CDATA[Tran]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ngo]]></surname>
<given-names><![CDATA[Chan Nam]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,HCMC University of Technology Faculty of Computer Science and Engineering ]]></institution>
<addr-line><![CDATA[Ho Chi Minh City ]]></addr-line>
<country>Vietnam</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2015</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2015</year>
</pub-date>
<numero>52</numero>
<fpage>51</fpage>
<lpage>65</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1870-90442015000200007&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1870-90442015000200007&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1870-90442015000200007&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[The development of location-based services has spread over many aspects of modern social life. This development brings not only conveniences to users' daily life but also great concerns about users' location privacy. In such services, location privacy aware query processing that handles cloaked regions is becoming an essential part in preserving user privacy. However, the state-of-the-art cloaked-region-based query processors only focus on handling rectangular regions, while lacking an efficient and scalable algorithm for other complex region shapes. Motivated by that problem, we introduce enhancements and additional components to the location privacy aware nearest-neighbor query processor that provides efficient processing of complex polygonal and circular cloaked regions, namely the Vertices Reduction Paradigm and the Group Execution Agent. We also provide a new tuning parameter to achieve trade-off between answer optimality and system scalability. Experiments show that our query processing algorithm outperforms previous works, in terms of processing time and system scalability.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Complex cloaked region]]></kwd>
<kwd lng="en"><![CDATA[database security and integrity]]></kwd>
<kwd lng="en"><![CDATA[group execution]]></kwd>
<kwd lng="en"><![CDATA[location-based service]]></kwd>
<kwd lng="en"><![CDATA[location privacy]]></kwd>
<kwd lng="en"><![CDATA[nearest-neighbor query]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="center"><font face="verdana" size="4"><b>Location Privacy&#45;Aware Nearest&#45;Neighbor Query with Complex Cloaked Regions</b></font></p>     <p align="center">&nbsp;	</p> 	    <p align="center"><font face="verdana" size="2"><b>Tran Khanh Dang and Chan Nam Ngo</b></font></p>     <p align="center">&nbsp;</p>      <p align="justify"><font face="verdana" size="2"><i>Faculty of Computer Science and Engineering, HCMC University of Technology, VNUHCM, Vietnam</i> (e-mail: <a href="mailto:khanh@cse.hcmut.edu.vn">khanh@cse.hcmut.edu.vn</a>).</font></p>     <p>&nbsp;</p>     <p align="justify"><font face="verdana" size="2">Manuscript received on August 20, 2015    <br> Accepted for publication on October 2, 2015    <br> Published on October 15, 2015</font></p>     ]]></body>
<body><![CDATA[<p align="justify">&nbsp;</p> 	    <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>  	    <p align="justify"><font face="verdana" size="2">The development of location&#45;based services has spread over many aspects of modern social life. This development brings not only conveniences to users' daily life but also great concerns about users' location privacy. In such services, location privacy aware query processing that handles cloaked regions is becoming an essential part in preserving user privacy. However, the state&#45;of&#45;the&#45;art cloaked&#45;region&#45;based query processors only focus on handling rectangular regions, while lacking an efficient and scalable algorithm for other complex region shapes. Motivated by that problem, we introduce enhancements and additional components to the location privacy aware nearest&#45;neighbor query processor that provides efficient processing of complex polygonal and circular cloaked regions, namely the Vertices Reduction Paradigm and the Group Execution Agent. We also provide a new tuning parameter to achieve trade&#45;off between answer optimality and system scalability. Experiments show that our query processing algorithm outperforms previous works, in terms of processing time and system scalability. </font></p>      <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Complex cloaked region, database security and integrity, group execution, location&#45;based service, location privacy, nearest&#45;neighbor query.</font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/poli/n52/n52a7.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p>&nbsp;</p>  	    <p align="justify"><font face="verdana" size="2"><b>REFERENCES</b></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; C. Bettini, X. S. Wang, and S. Jajodia, "How anonymous is k&#45;anonymous? look at your quasi&#45;ID," in <i>Proceedings of the 5th VLDB Workshop on Secure Data Management,</i> ser. SDM&#45;08. Berlin, Heidelberg: Springer&#45;Verlag, 2008, pp. 1&#45;15.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054205&pid=S1870-9044201500020000700001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    ]]></body>
<body><![CDATA[<!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; T. K. Dang, C. N. Ngo, T. N. Phan, and N. N. M. Ngo, "An open design privacy&#45;enhancing platform supporting location&#45;based applications," in <i>Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication,</i> ser. ICUIMC&#45;12. New York, NY, USA: ACM, 2012, pp. 59:1&#45;59:10. &#91;Online&#93;. Available: <a href="http://doi.acm.org/10.1145/2184751.2184824" target="_blank">http://doi.acm.org/10.1145/2184751.2184824</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054207&pid=S1870-9044201500020000700002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; M. Duckham and L. Kulik, "A formal model of obfuscation and negotiation for location privacy," in <i>Proceedings of the Third International Conference on Pervasive Computing,</i> ser. PERVASIVE&#45;05. Berlin, Heidelberg: Springer&#45;Verlag, 2005, pp. 152&#45;170.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054208&pid=S1870-9044201500020000700003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; M. L. Damiani, E. Bertino, and C. Silvestri, "The PROBE framework for the personalized cloaking of private locations," <i>Trans. Data Privacy,</i> vol. 3, no. 2, pp. 123&#45;148, Aug. 2010. &#91;Online&#93;. Available: <a href="http://dl.acm.org/citation.cfm?id=1824401.1824404" target="_blank">http://dl.acm.org/citation.cfm?id=1824401.1824404</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054210&pid=S1870-9044201500020000700004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;5&#93; M. Gruteser and D. Grunwald, "Anonymous usage of location&#45;based services through spatial and temporal cloaking," in <i>Proceedings of the 1st International Conference on Mobile Systems, Applications and Services,</i> ser. MobiSys&#45;03. New York, NY, USA: ACM, 2003, pp. 31&#45;42. &#91;Online&#93;. Available: <a href="http://doi.acm.org/10.1145/1066116.1189037" target="_blank">http://doi.acm.org/10.1145/1066116.1189037</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054211&pid=S1870-9044201500020000700005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;6&#93; T. T. B. Le and T. K. Dang, "Semantic&#45;aware obfuscation for location privacy at database level," in <i>Proceedings of the 2013 International Conference on Information and Communication Technology,</i> ser. ICT&#45;EurAsia&#45;13. Berlin, Heidelberg: Springer&#45;Verlag, 2013, pp. 111&#45;120.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054212&pid=S1870-9044201500020000700006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;7&#93; Q. C. Truong, A. T. Truong, and T. K. Dang, "Memorizing algorithm: Protecting user privacy using historical information of location&#45;based services," <i>IJMCMC,</i> pp. 65&#45;86, 2010.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054214&pid=S1870-9044201500020000700007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;8&#93; C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimercati, and P. Samarati, "Location privacy protection through obfuscation&#45;based techniques," in <i>Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security.</i> Berlin, Heidelberg: Springer&#45;Verlag, 2007, pp. 47&#45;60. &#91;Online&#93;. Available: <a href="http://dl.acm.org/citation.cfm?id=1770560.1770566" target="_blank">http://dl.acm.org/citation.cfm?id=1770560.1770566</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054216&pid=S1870-9044201500020000700008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;9&#93; P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing location&#45;based identity inference in anonymous spatial queries," <i>IEEE Trans. on Knowl. and Data Eng.,</i> vol. 19, no. 12, pp. 1719&#45;1733, Dec. 2007. &#91;Online&#93;. Available: <a href="http://dx.doi.org/10.1109/TKDE.2007.190662" target="_blank">http://dx.doi.org/10.1109/TKDE.2007.190662</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054217&pid=S1870-9044201500020000700009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;10&#93; C.&#45;Y. Chow, M. F. Mokbel, and W. G. Aref, "Casper*: Query processing for location services without compromising privacy," <i>ACM Trans. Database Syst.,</i> vol. 34, no. 4, pp. 24:1&#45;24:48, Dec. 2009. &#91;Online&#93;. Available: <a href="http://doi.acm.org/10.1145/1620585.1620591" target="_blank">http://doi.acm.org/10.1145/1620585.1620591</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054218&pid=S1870-9044201500020000700010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;11&#93; H. Hu and D. Lee, "Range nearest&#45;neighbor query," <i>IEEE Transactions on Knowledge and Data Engineering,</i> vol. 18, no. 1, pp. 78&#45;91, Jan 2006.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054219&pid=S1870-9044201500020000700011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;12&#93; G. Ghinita, P. Kalnis, and S. Skiadopoulos, "PRIVE: Anonymous location&#45;based queries in distributed mobile systems," in <i>Proceedings of the 16th International Conference on World Wide Web,</i> ser. WWW&#45;07. New York, NY, USA: ACM, 2007, pp. 371&#45;380. &#91;Online&#93;. Available: <a href="http://doi.acm.org/10.1145/1242572.1242623" target="_blank">http://doi.acm.org/10.1145/1242572.1242623</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054221&pid=S1870-9044201500020000700012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;13&#93; R. Shokri, C. Troncoso, C. Diaz, J. Freudiger, and J.&#45;P. Hubaux, "Unraveling an old cloak: K&#45;anonymity for location privacy," in <i>Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society,</i> ser. WPES&#45;10. New York, NY, USA: ACM, 2010, pp. 115&#45;118. &#91;Online&#93;. Available: <a href="http://doi.acm.org/10.1145/1866919.1866936" target="_blank">http://doi.acm.org/10.1145/1866919.1866936</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054222&pid=S1870-9044201500020000700013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;14&#93; Q. C. To, T. K. Dang, and J. K&uuml;ng, "OST&#45;tree: An access method for obfuscating spatio&#45;temporal data in location based services," in <i>2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS),</i> Feb 2011, pp. 1&#45;5.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054223&pid=S1870-9044201500020000700014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;15&#93; Q. C. To, T. K. Dang, and J. K&uuml;ng, "A hilbert&#45;based framework for preserving privacy in location&#45;based services," <i>Int. J. Intell. Inf. Database Syst.,</i> vol. 7, no. 2, pp. 113&#45;134, Apr. 2013. &#91;Online&#93;. Available: <a href="http://dx.doi.org/10.1504/IJIIDS.2013.053546" target="_blank">http://dx.doi.org/10.1504/IJIIDS.2013.053546</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054225&pid=S1870-9044201500020000700015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;16&#93; M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu, "SpaceTwist: Managing the trade&#45;offs among location privacy, query performance, and query accuracy in mobile services," in <i>Proceedings of the 2008 IEEE 24th International Conference on Data Engineering,</i> ser. ICDE&#45;08. Washington, DC, USA: IEEE Computer Society, 2008, pp. 366&#45;375. &#91;Online&#93;. Available: <a href="http://dx.doi.org/10.1109/ICDE.2008.4497445" target="_blank">http://dx.doi.org/10.1109/ICDE.2008.4497445</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054226&pid=S1870-9044201500020000700016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;17&#93; A. Khoshgozaran and C. Shahabi, "Private information retrieval techniques for enabling location privacy in location&#45;based services," in <i>Privacy in Location&#45;Based Applications,</i> C. Bettini, S. Jajodia, P. Samarati, and X. S. Wang, Eds. Berlin, Heidelberg: Springer&#45;Verlag, 2009, pp. 59&#45;83.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054227&pid=S1870-9044201500020000700017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;18&#93; Y. Tao, D. Papadias, and Q. Shen, "Continuous nearest neighbor search," in <i>Proceedings of the 28th International Conference on Very Large Data Bases,</i> ser. VLDB&#45;02. VLDB Endowment, 2002, pp. 287&#45;298. &#91;Online&#93;. Available: <a href="http://dl.acm.org/citation.cfm?id=1287369.1287395" target="_blank">http://dl.acm.org/citation.cfm?id=1287369.1287395</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054229&pid=S1870-9044201500020000700018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;19&#93; D. H. Douglas and T. K. Peucker, <i>Algorithms for the Reduction of the Number of Points Required to Represent a Digitized Line or its Caricature.</i> John Wiley &amp; Sons, Ltd, 2011, pp. 15&#45;28. &#91;Online&#93;. Available: <a href="http://dx.doi.org/10.1002/9780470669488.ch2" target="_blank">http://dx.doi.org/10.1002/9780470669488.ch2</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054230&pid=S1870-9044201500020000700019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;20&#93; J. Hershberger and J. Snoeyink, "Speeding up the douglas&#45;peucker line&#45;simplification algorithm," University of British Columbia, Vancouver, BC, Canada, Canada, Tech. Rep., 1992.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054231&pid=S1870-9044201500020000700020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2">&#91;21&#93; A. Guttman, "R&#45;trees: A dynamic index structure for spatial searching," in <i>Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data,</i> ser. SIGMOD&#45;84. New York, NY, USA: ACM, 1984, pp. 47&#45;57. &#91;Online&#93;. Available: <a href="http://doi.acm.org/10.1145/602259.602266" target="_blank">http://doi.acm.org/10.1145/602259.602266</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=6054233&pid=S1870-9044201500020000700021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bettini]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Jajodia]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[How anonymous is k-anonymous? look at your quasi-ID]]></article-title>
<source><![CDATA[Proceedings of the 5th VLDB Workshop on Secure Data Management]]></source>
<year>2008</year>
<page-range>1-15</page-range><publisher-loc><![CDATA[BerlinHeidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[T. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Ngo]]></surname>
<given-names><![CDATA[C. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Phan]]></surname>
<given-names><![CDATA[T. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ngo]]></surname>
<given-names><![CDATA[N. N. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[An open design privacy-enhancing platform supporting location-based applications]]></article-title>
<source><![CDATA[Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication]]></source>
<year>2012</year>
<page-range>59:1-59:10</page-range><publisher-loc><![CDATA[New YorkNY ]]></publisher-loc>
<publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duckham]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kulik]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A formal model of obfuscation and negotiation for location privacy]]></article-title>
<source><![CDATA[Proceedings of the Third International Conference on Pervasive Computing]]></source>
<year>2005</year>
<page-range>152-170</page-range><publisher-loc><![CDATA[BerlinHeidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Damiani]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Bertino]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Silvestri]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The PROBE framework for the personalized cloaking of private locations]]></article-title>
<source><![CDATA[Trans. Data Privacy]]></source>
<year>Aug.</year>
<month> 2</month>
<day>01</day>
<volume>3</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>123-148</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gruteser]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Grunwald]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Anonymous usage of location-based services through spatial and temporal cloaking]]></article-title>
<source><![CDATA[Proceedings of the 1st International Conference on Mobile Systems, Applications and Services]]></source>
<year>2003</year>
<page-range>31-42</page-range><publisher-loc><![CDATA[New York^eNY NY]]></publisher-loc>
<publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Le]]></surname>
<given-names><![CDATA[T. T. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[T. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Semantic-aware obfuscation for location privacy at database level]]></article-title>
<source><![CDATA[Proceedings of the 2013 International Conference on Information and Communication Technology]]></source>
<year>2013</year>
<page-range>111-120</page-range><publisher-loc><![CDATA[BerlinHeidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Truong]]></surname>
<given-names><![CDATA[Q. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Truong]]></surname>
<given-names><![CDATA[A. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[T. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Memorizing algorithm: Protecting user privacy using historical information of location-based services]]></article-title>
<source><![CDATA[IJMCMC]]></source>
<year>2010</year>
<page-range>65-86</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ardagna]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Cremonini]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Damiani]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[di Vimercati]]></surname>
<given-names><![CDATA[S. D. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Samarati]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Location privacy protection through obfuscation-based techniques]]></article-title>
<source><![CDATA[Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security]]></source>
<year>2007</year>
<page-range>47-60</page-range><publisher-loc><![CDATA[BerlinHeidelberg ]]></publisher-loc>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kalnis]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghinita]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Mouratidis]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Papadias]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Preventing location-based identity inference in anonymous spatial queries]]></article-title>
<source><![CDATA[IEEE Trans. on Knowl. and Data Eng.]]></source>
<year>2007</year>
<volume>19</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>1719-1733</page-range><publisher-name><![CDATA[Dec.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chow]]></surname>
<given-names><![CDATA[C.-Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Mokbel]]></surname>
<given-names><![CDATA[M. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Aref]]></surname>
<given-names><![CDATA[W. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Casper*: Query processing for location services without compromising privacy]]></article-title>
<source><![CDATA[ACM Trans. Database Syst.]]></source>
<year>2009</year>
<volume>34</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>24:1-24:48</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Range nearest-neighbor query]]></article-title>
<source><![CDATA[IEEE Transactions on Knowledge and Data Engineering]]></source>
<year>Jan </year>
<month>20</month>
<day>06</day>
<volume>18</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>78-91</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ghinita]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Kalnis]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Skiadopoulos]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[PRIVE: Anonymous location-based queries in distributed mobile systems]]></article-title>
<source><![CDATA[Proceedings of the 16th International Conference on World Wide Web]]></source>
<year>2007</year>
<page-range>371-380</page-range><publisher-loc><![CDATA[New York^eNY NY]]></publisher-loc>
<publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shokri]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Troncoso]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Diaz]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Freudiger]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hubaux]]></surname>
<given-names><![CDATA[J.-P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Unraveling an old cloak: K-anonymity for location privacy]]></article-title>
<source><![CDATA[Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society]]></source>
<year>2010</year>
<page-range>115-118</page-range><publisher-loc><![CDATA[New York^eNY NY]]></publisher-loc>
<publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[To]]></surname>
<given-names><![CDATA[Q. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[T. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Küng]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[OST-tree: An access method for obfuscating spatio-temporal data in location based services]]></article-title>
<source><![CDATA[2011 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS)]]></source>
<year>Feb </year>
<month>20</month>
<day>11</day>
<page-range>1-5</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[To]]></surname>
<given-names><![CDATA[Q. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Dang]]></surname>
<given-names><![CDATA[T. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Küng]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A hilbert-based framework for preserving privacy in location-based services]]></article-title>
<source><![CDATA[Int. J. Intell. Inf. Database Syst.]]></source>
<year>Apr.</year>
<month> 2</month>
<day>01</day>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>113-134</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yiu]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Jensen]]></surname>
<given-names><![CDATA[C. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services]]></article-title>
<source><![CDATA[Proceedings of the 2008 IEEE 24th International Conference on Data Engineering]]></source>
<year>2008</year>
<page-range>366-375</page-range><publisher-loc><![CDATA[Washington^eDC DC]]></publisher-loc>
<publisher-name><![CDATA[IEEE Computer Society]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khoshgozaran]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Shahabi]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Private information retrieval techniques for enabling location privacy in location-based services]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Bettini]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Jajodia]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Samarati]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Privacy in Location-Based Applications]]></source>
<year>2009</year>
<page-range>59-83</page-range><publisher-loc><![CDATA[Berlin ]]></publisher-loc>
<publisher-name><![CDATA[HeidelbergSpringer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tao]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Papadias]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Shen]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Continuous nearest neighbor search]]></article-title>
<source><![CDATA[Proceedings of the 28th International Conference on Very Large Data Bases]]></source>
<year>2002</year>
<page-range>287-298</page-range><publisher-name><![CDATA[VLDB Endowment]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Douglas]]></surname>
<given-names><![CDATA[D. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Peucker]]></surname>
<given-names><![CDATA[T. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Algorithms for the Reduction of the Number of Points Required to Represent a Digitized Line or its Caricature]]></source>
<year>2011</year>
<page-range>15-28</page-range><publisher-name><![CDATA[John Wiley & Sons, Ltd]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hershberger]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Snoeyink]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Speeding up the douglas-peucker line-simplification algorithm]]></source>
<year>1992</year>
<publisher-loc><![CDATA[Vancouver^eBC BC]]></publisher-loc>
<publisher-name><![CDATA[University of British ColumbiaTech. Rep.]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guttman]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[R-trees: A dynamic index structure for spatial searching]]></article-title>
<source><![CDATA[Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data]]></source>
<year>1984</year>
<page-range>47-57</page-range><publisher-loc><![CDATA[New York^eNY NY]]></publisher-loc>
<publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
