ABSTRACT
Recently, location based services (LBS) have become more important in today technology advancements. Privacy issue in LBS is one of the most important concerns. In this paper, we have proposed an anonymity preserving framework which can provide a user with more privacy in both authenticating and querying processes. In our framework, an authentication protocol has been proposed, in order to strengthen a privacy, a technique called "Timed Fuzzy Logic" is used. In querying processes of location based services, the use of the Anonymizer, a trusted third party, to provide users anonymous querying and requesting processes is presented. Moreover, when concerning on privacy in user's context, k-anonymity cloaking has been employed for the purpose of preventing user's current location from tracking.
- Truong, H, Dustdar, s. 2009. A survey on context-aware web service systems. International Journal of Web Information Systems, Vol. 5 (2009) 5--31.Google ScholarCross Ref
- Chou, S.-C, Hsieh, W.-T., Gandon, F. L., Sadeh, N. M. 2005. Semantic Web Technologies for Context-Aware Museum Tour Guide Applications. In Proc. of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005). Vol. 2, 709--714. Google ScholarDigital Library
- Sheshagiri, M., Sadeh, N., Gandon, F. 2004. Using Semantic Web Services for Context-Aware Mobile Applications. Workshop on Context Awareness (MobiSys 2004).Google Scholar
- Bernardos, A. M., Tarrio, P., Casar, J. R. 2008. A data fusion framework for context-aware mobileservices. In Proc. of IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, Seoul, Korea.Google Scholar
- O'Driscoll, C. 2008. Privacy in context: Privacy issues in ubiquitous computing applications. In Proc. of the 3rd International Conference on Digital Information Management (ICDM 2008). 827--837.Google ScholarCross Ref
- Mohapatra, D., Suma, S. B. 2005. Survey of location based wireless services. In Proc. of IEEE International Conference on Personal Wireless Communications (ICPWC 2005). 358--362.Google ScholarCross Ref
- Chow, C.-Y., Mokbel, M. F. 2009. Privacy in Location-based Services: A System Architecture Perspective, SIGSPATIAL Special 1(2): 23--17. Google ScholarDigital Library
- Kim, H., Lee, K.-W,. Suh, Y.-H., Cho, J.-M., Cho, Y.-J. 2007. Client/Server Framework for Providing Context-Aware Services to Network Based Robots. In Proc. of the 16th IEEE International Conference on Robot & Human Interactive Communication, Jeju, Korea.Google ScholarCross Ref
- Sarathy, R., Muralidhar, K. 2006. Secure and useful data sharing. Journal of Decision Support Systems 42. 204--220. Google ScholarDigital Library
- Hiramatsu, A., Kawamura, N., Takada, Y., Komoda, N. 2003. Operation support for the location aware exhibit information service system using Bluetooth communication. In Proc. of IEEE International Conference on Systems, Man and Cybernetics. Vol. 4, 4051--4056.Google ScholarCross Ref
- Jian, M.-S., Hsu, S. H. 2009. Location Aware Public/Personal Diversity of Information Services based on embedded RFID Platform. In Proc. of the 11th International Conference on Advanced Communication Technology (ICACT 2009). Vol. 2, (2009) 1145--1150. Google ScholarDigital Library
- Devlic, A.; Jezic, G. 2005. Location-aware information services using user profile matching. In Proc. of 8th Conference on Telecommunications (ConTEL 2005), 327--334.Google ScholarCross Ref
- Zhang, G., Liu, L., Seshadri, S., Bamba, B., Wang, Y. 2009. Scalable and Reliable Location Services through Decentralized Replication. In Proc. of IEEE International Conference on Web Services (ICWS 2009). 632--638. Google ScholarDigital Library
- Mokbel, M. F. 2006. Towards Privacy-Aware Location-Based Database Servers. In Proc. of 22nd International Conference on Data Engineering Workshops. Google ScholarDigital Library
- Mokbel, M. F., Chow, C.-Y., Aref, W. G. 2007. The New Casper: A Privacy-Aware Location-Based Database Server. In Proc. of IEEE 23rd International Conference on Data Engineering (ICDE 2007).Google ScholarCross Ref
- Po-YiLi, Peng, W.-C, Wang, T.-W., Ku, W.-S., Xu, I., Hamilton, J. A. 2008. A Cloaking Algorithm based on Spatial Networks for Location Privacy. In Proc. of IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing (SUTC '08). Google ScholarDigital Library
- Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D., Triandopoulos, N. 2010. AnonySense: A system for anonymous opportunistic sensing. Journal of Pervasive and Mobile Computing. DOI=10.1016/j.pmcj.2010.04.001. Google ScholarDigital Library
- Chow, C., Mokbel, M. F., and Liu, X. 2006. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proc. of the 14th Annual ACM international Symposium on Advances in Geographic information Systems (Arlington, Virginia, USA, November 10--11, 2006). GIS '06. ACM, New York, NY, 171--178. DOI= http://doi.acm.org/10.1145/1183471.1183500. Google ScholarDigital Library
- Marco Gruteser and Dirk Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proc. of the International Conference on Mobile Systems, Applications, and Services (MobiSys 2003). 163--168 Google ScholarDigital Library
- Wu, X., Bertino, E. 2005. Achieving K-anonymity in mobile ad hoc networks. In 1st IEEE ICNP Workshop on Secure Network Protocols (NPSec). Google ScholarDigital Library
- Zhong, G., Hengartner, U. 2009. A distributed k-anonymity protocol for location privacy. In Proc. of IEEE International Conference on Pervasive Computing and Communications (PerCom'09), 1--10. DOI= 10.1109/PERCOM.2009.4912774. Google ScholarDigital Library
- Wang, S., Wang, X. S. 2009. AnonTwist: Nearest Neighbor Querying with Both Location Privacy and K-anonymity for Mobile Users. In Proc. of 10th International Conference on Mobile Data Management: Systems, Services and Middleware (MDM '09). DOI= 10.1109/MDM.2009.73. Google ScholarDigital Library
- Song, M., Hu, X., Li, J., Deng, G. 2007. An Authentication Model Involving Trusted Third Party for M-Commerce. In Proc. of International Conference on the Management of Mobile Business (ICMB'07). DOI= 10.1109/ICMB.2007.10. Google ScholarDigital Library
- Zhang, Z.-J., Wang, Z.-J., Zhang, B.-H. 2008. Studies on median value of fuzzy numbers based on confidence level. In Proc. of International Conference on Machine Learning and Cybernetics, 588--593. DOI= 10.1109/ICMLC.2008.4620473.Google Scholar
- Li, H., Dick, S. H., Pedrycz, W. 2004. Similarity confidence level for fuzzy rulebases. In IEEE Annual Meeting of the Fuzzy Information (Processing NAFIPS '04). Vol. 2, 882--887. DOI= 10.1109/NAFIPS.2004.1337420.Google ScholarCross Ref
- Malek, B., Miri, A., Karmouch, A. 2008. A framework for context-aware authentication. In Proc. of IET 4th International Conference on Intelligent Environments, 1--8.Google ScholarCross Ref
- Ragab, A. H. M., Ismail, N. A., Allah, O. S. F. 2001. An efficient message digest algorithm (MD) for data security. Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology (TENCON). Vol. 1, 191--197. DOI= 10.1109/TENCON.2001.949578.Google ScholarCross Ref
- Habib, A., Xu, D., Atallah, M., Bhargava, B., Chuang, J. 2005. A tree-based forward digest protocol to verify data integrity in distributed media streaming. IEEE Transactions on Knowledge and Data Engineering. Vol. 17(7), 1010--1014. DOI= 10.1109/TKDE.2005.102. Google ScholarDigital Library
- Cheng, X.-h., Deng, J.-z. 2010. Design of SHA-1 Algorithm Based on FPGA. In Proc. of 2nd International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC). Vol. 1, 532--534. DOI= 10.1109/NSWCTC.2010.131 Google ScholarDigital Library
- Kitsos, P., Koufopavlou, O. 2004. Whirlpool hash function: architecture and VLSI implementation. In Proc. of the International Symposium on Circuits and Systems (ISCAS '04). Vol. 2, II - 893--6.Google ScholarCross Ref
Index Terms
- Anonymity preserving framework for location-based information services
Recommendations
Location privacy protection with a semi-honest anonymizer in information centric networking
ICN '18: Proceedings of the 5th ACM Conference on Information-Centric NetworkingLocation-based services, which provide services based on locations of consumers' interests, are becoming essential for our daily lives. Since the location of a consumer's interest contains private information, several studies propose location privacy ...
Improved yoking proof protocols for preserving anonymity
In emerging RFID applications, the yoking proof provides a method not only to ensure the physical proximity of multiple objects but also to verify that a pair of RFID tags has been scanned simultaneously by a reader. Previous studies have focused on ...
Caching as Privacy Enhancing Mechanism in Location-Based Services
MDM '09: Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and MiddlewareA Location-based Service has to protect user's location and query information to alleviate privacy concerns. Several location and query privacy preserving approaches, based on the concept of k-anonymity and l-diversity, have been proposed in the ...
Comments