Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing
- 422 Downloads
In Chapter 3, we evaluated privacy protection in the context of V2X-based safety applications, and in Chapter 4, we proposed a pseudonym system with strong privacy guarantees. These protection mechanisms on the lower layers are the precondition for privacy-friendly applications on higher layers. In this chapter, we examine a scenario where privacy protection must be balanced with application requirements.
KeywordsCommunication Overhead Accuracy Level Line Graph Privacy Protection Secret Sharing Scheme
Unable to display preview. Download preview PDF.