Long-Term Quality of Protection

  • Living reference work entry
  • First Online:
Encyclopedia of Wireless Networks
  • 59 Accesses

Synonyms

Privacy preservation; Quality of protection

Definition

Long-term quality of protection (QoP) is envisioned to sustain personalized services with long-term privacy preservation.

Historical Background

Quality-of-protection (QoP) (Wang and Zhang 2015; Weber 2015) mechanisms have been exploited to thwart privacy breach in sharing user-generated content, including user’s location information in location-based services (LBSs), and sensor data in participatory sensing (Wang et al. 2017). These mechanisms employ several QoP models that can be categorized into the following three classes (Wang and Zhang 2015).

Anonymization and generalization models. The crux of anonymization and generalization models is to replace a specific value of user’s attributes (such as sensor data) with a coarser range to provide privacy protection (Zarrin et al. 2017). In LBS systems, the location coordinates of multiple users are transformed into the same geographical region to hide a user’s specific...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Gotz M, Nath S, Gehrke J (2012) MaskIt: privately releasing user context streams for personalized mobile applications. Proc ACM SIGMOD:289–300

    Google Scholar 

  • Wang W, Zhang Q (2015) Toward long-term quality of protection in mobile networks: a context-aware perspective. IEEE Wirel Commun 22(4):34–40

    Article  Google Scholar 

  • Wang S, Li L, Sun W, Guo J, Bie R, Lin K (2017) Context sensing system analysis for privacy preservation based on game theory. Sensors 17(2):339

    Article  Google Scholar 

  • Weber RH (2015) Internet of things: privacy issues revisited. Comput Law Secur Rev 31(5):618–627

    Article  Google Scholar 

  • Wishart R, Henricksen K, Indulska J (2007) Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system. In: International conference on ubiquitous intelligence and computing. Springer, Berlin/Heidelberg, pp 929–940

    Google Scholar 

  • Zarrin M, Houmansadr A, Pishro-Nik H (2017) Achieving perfect location privacy in wireless devices using anonymization. IEEE Trans Inf Forensics Secur 12(11):2683–2698

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Wang .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Wang, W., Jiang, T., Zhang, Q. (2018). Long-Term Quality of Protection. In: Shen, X., Lin, X., Zhang, K. (eds) Encyclopedia of Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-32903-1_50-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32903-1_50-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32903-1

  • Online ISBN: 978-3-319-32903-1

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics

Navigation