Using DGS Preserving Location Based Services by Encryption privacy

International Journal of Computer Science (IJCS Journal) Published by SK Research Group of Companies (SKRGC) Scholarly Peer Reviewed Research Journals

Format: Volume 4, Issue 2, No 6, 2016

Copyright: All Rights Reserved ©2016

Year of Publication: 2016

Author: Pothula Anusha,MD Rafeeq

Reference:IJCS-144

View PDF Format

Abstract

Due to the large increasing use of Location Based Services (LBS), which require personal data of the user to provide the continuous service, protecting the privacy of these data has become a challenge. An approach to preserving a privacy is through anonymity, by hiding the identity and user location data of the mobile device from the service provider(third party) or from any unauthorized party who has access at the user’s request .Considering the challenge mentioned, in this paper gives a classification according to the Architecture, approaches and techniques used in previous works, and presents a survey of solutions to provide anonymity in LBS including the open issues or possible improvements to current solutions. All of this, in order to provide guidelines for choosing the best solution approach to a specific scenery in which anonymity is required.

References

[1] Schiller, J. Voisard, A.: Location-Based Services. Morgan Kaufmann Publishers (2004) [2] Mohaisen, A., Hong, D., Nyang, D.: Privacy in Location based services: Primitives toward the solution. NCM (2008) [3] C.-Y. Chow and M. F. Mokbel, “Enabling private continuous queries for revealed user locations,” in Proc. 10th Int. Conf. Adv. Spatial Temporal Databases, 2007, pp. 258–273. [4] B. Gedik and L. Liu, “Protecting location privacy with personalized k-anonymity: Architecture and algorithms,” IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 1–18, Jan. 2008. [5] M. Gruteser and D. Grunwald, “Anonymous usage of locationbased services through spatial and temporal cloaking,” in Proc. 1st Int. Conf. Mobile Syst., Appl. Services, 2003, pp. 31–42. [6] P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Trans. Knowl. Data Eng., vol. 19, no. 12, pp. 1719–1733, Dec. 2007. [7] M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: Query processing for location services withoutcompromising privacy,” in Proc. 32nd Int. Conf. Very Large Data Bases, 2006, pp. 763–774. [8] T. Xu and Y. Cai, “Location anonymity in continuous locationbased services,” in Proc. 15th Annu. ACM Int. Symp. Adv. Geographic Inf. Syst., 2007, pp. 39:1–39:8. [9]. Kido, H., Yanagisawa, Y., Satoh, T. An Anonymous Communication Technique using Dummies for Location-based Services. In: IEEE International Conference on Pervasive Services ICPS (2005) 88–97 [10]. Lu, H., Jensen, C.S., Yiu, M.L.: PAD: Privacy-Area Aware. Dummy-Based Location Privacy in Mobile Services MobiDE (2008) 16–23 [11]. Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacy grid. In: Proceedings of the International World Wide Web Conference, WWW (2008) [12]. Gedik, B.,Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. In: IEEE Transactions on Mobile Computing, TMC (2008) 1–18 [13]. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the International Conference on Mobile Systems,Applications, and Services, MobiSys (2003) [14] Roman Schlegel, Member, IEEE, Chi-Yin Chow, Member, IEEE, Qiong Huang, Member, IEEE, and Duncan S. Wong, Member, IEEE, “User-Defined Privacy Grid System for Continuous Location-Based Services”, IEEE Transactions on Mobile Computing, 2015. [15]. Ardagna, C. A., Cremonini, M., Damiani, E., De Capitani di Vimercati S., Samarati, P.: Location privacy protection through obfuscation based techniques. Data and Applications Security XXI, Volume 4602 (2007) [16]. Wightman, P.M.; Jimeno, M.A; Jabba, D.; Labrador, M.: Matlock: A location obfuscation technique for accuracy-restricted applications. 2012 IEEE Wireless Communications and Networking Conference (WCNC) (2012) [17]. Di Pietro, R., Mandati, R., Verde, N.V.: Track me if you can: Transparent obfuscation for Location based Services. 2013 IEEE 14th International Symposium and Workshops on World of Wireless, Mobile and Multimedia Networks (WoWMoM) (2013)


Keywords

Dynamic grid system, cloaking areas, location based services, Encryption, privacy.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

TOP
Facebook IconYouTube IconTwitter IconVisit Our Blog