skip to main content
10.1145/1936254.1936274acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
research-article

Anonymity preserving framework for location-based information services

Published:26 October 2010Publication History

ABSTRACT

Recently, location based services (LBS) have become more important in today technology advancements. Privacy issue in LBS is one of the most important concerns. In this paper, we have proposed an anonymity preserving framework which can provide a user with more privacy in both authenticating and querying processes. In our framework, an authentication protocol has been proposed, in order to strengthen a privacy, a technique called "Timed Fuzzy Logic" is used. In querying processes of location based services, the use of the Anonymizer, a trusted third party, to provide users anonymous querying and requesting processes is presented. Moreover, when concerning on privacy in user's context, k-anonymity cloaking has been employed for the purpose of preventing user's current location from tracking.

References

  1. Truong, H, Dustdar, s. 2009. A survey on context-aware web service systems. International Journal of Web Information Systems, Vol. 5 (2009) 5--31.Google ScholarGoogle ScholarCross RefCross Ref
  2. Chou, S.-C, Hsieh, W.-T., Gandon, F. L., Sadeh, N. M. 2005. Semantic Web Technologies for Context-Aware Museum Tour Guide Applications. In Proc. of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005). Vol. 2, 709--714. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Sheshagiri, M., Sadeh, N., Gandon, F. 2004. Using Semantic Web Services for Context-Aware Mobile Applications. Workshop on Context Awareness (MobiSys 2004).Google ScholarGoogle Scholar
  4. Bernardos, A. M., Tarrio, P., Casar, J. R. 2008. A data fusion framework for context-aware mobileservices. In Proc. of IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, Seoul, Korea.Google ScholarGoogle Scholar
  5. O'Driscoll, C. 2008. Privacy in context: Privacy issues in ubiquitous computing applications. In Proc. of the 3rd International Conference on Digital Information Management (ICDM 2008). 827--837.Google ScholarGoogle ScholarCross RefCross Ref
  6. Mohapatra, D., Suma, S. B. 2005. Survey of location based wireless services. In Proc. of IEEE International Conference on Personal Wireless Communications (ICPWC 2005). 358--362.Google ScholarGoogle ScholarCross RefCross Ref
  7. Chow, C.-Y., Mokbel, M. F. 2009. Privacy in Location-based Services: A System Architecture Perspective, SIGSPATIAL Special 1(2): 23--17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kim, H., Lee, K.-W,. Suh, Y.-H., Cho, J.-M., Cho, Y.-J. 2007. Client/Server Framework for Providing Context-Aware Services to Network Based Robots. In Proc. of the 16th IEEE International Conference on Robot & Human Interactive Communication, Jeju, Korea.Google ScholarGoogle ScholarCross RefCross Ref
  9. Sarathy, R., Muralidhar, K. 2006. Secure and useful data sharing. Journal of Decision Support Systems 42. 204--220. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Hiramatsu, A., Kawamura, N., Takada, Y., Komoda, N. 2003. Operation support for the location aware exhibit information service system using Bluetooth communication. In Proc. of IEEE International Conference on Systems, Man and Cybernetics. Vol. 4, 4051--4056.Google ScholarGoogle ScholarCross RefCross Ref
  11. Jian, M.-S., Hsu, S. H. 2009. Location Aware Public/Personal Diversity of Information Services based on embedded RFID Platform. In Proc. of the 11th International Conference on Advanced Communication Technology (ICACT 2009). Vol. 2, (2009) 1145--1150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Devlic, A.; Jezic, G. 2005. Location-aware information services using user profile matching. In Proc. of 8th Conference on Telecommunications (ConTEL 2005), 327--334.Google ScholarGoogle ScholarCross RefCross Ref
  13. Zhang, G., Liu, L., Seshadri, S., Bamba, B., Wang, Y. 2009. Scalable and Reliable Location Services through Decentralized Replication. In Proc. of IEEE International Conference on Web Services (ICWS 2009). 632--638. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Mokbel, M. F. 2006. Towards Privacy-Aware Location-Based Database Servers. In Proc. of 22nd International Conference on Data Engineering Workshops. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mokbel, M. F., Chow, C.-Y., Aref, W. G. 2007. The New Casper: A Privacy-Aware Location-Based Database Server. In Proc. of IEEE 23rd International Conference on Data Engineering (ICDE 2007).Google ScholarGoogle ScholarCross RefCross Ref
  16. Po-YiLi, Peng, W.-C, Wang, T.-W., Ku, W.-S., Xu, I., Hamilton, J. A. 2008. A Cloaking Algorithm based on Spatial Networks for Location Privacy. In Proc. of IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing (SUTC '08). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D., Triandopoulos, N. 2010. AnonySense: A system for anonymous opportunistic sensing. Journal of Pervasive and Mobile Computing. DOI=10.1016/j.pmcj.2010.04.001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Chow, C., Mokbel, M. F., and Liu, X. 2006. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proc. of the 14th Annual ACM international Symposium on Advances in Geographic information Systems (Arlington, Virginia, USA, November 10--11, 2006). GIS '06. ACM, New York, NY, 171--178. DOI= http://doi.acm.org/10.1145/1183471.1183500. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Marco Gruteser and Dirk Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proc. of the International Conference on Mobile Systems, Applications, and Services (MobiSys 2003). 163--168 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Wu, X., Bertino, E. 2005. Achieving K-anonymity in mobile ad hoc networks. In 1st IEEE ICNP Workshop on Secure Network Protocols (NPSec). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Zhong, G., Hengartner, U. 2009. A distributed k-anonymity protocol for location privacy. In Proc. of IEEE International Conference on Pervasive Computing and Communications (PerCom'09), 1--10. DOI= 10.1109/PERCOM.2009.4912774. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Wang, S., Wang, X. S. 2009. AnonTwist: Nearest Neighbor Querying with Both Location Privacy and K-anonymity for Mobile Users. In Proc. of 10th International Conference on Mobile Data Management: Systems, Services and Middleware (MDM '09). DOI= 10.1109/MDM.2009.73. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Song, M., Hu, X., Li, J., Deng, G. 2007. An Authentication Model Involving Trusted Third Party for M-Commerce. In Proc. of International Conference on the Management of Mobile Business (ICMB'07). DOI= 10.1109/ICMB.2007.10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Zhang, Z.-J., Wang, Z.-J., Zhang, B.-H. 2008. Studies on median value of fuzzy numbers based on confidence level. In Proc. of International Conference on Machine Learning and Cybernetics, 588--593. DOI= 10.1109/ICMLC.2008.4620473.Google ScholarGoogle Scholar
  25. Li, H., Dick, S. H., Pedrycz, W. 2004. Similarity confidence level for fuzzy rulebases. In IEEE Annual Meeting of the Fuzzy Information (Processing NAFIPS '04). Vol. 2, 882--887. DOI= 10.1109/NAFIPS.2004.1337420.Google ScholarGoogle ScholarCross RefCross Ref
  26. Malek, B., Miri, A., Karmouch, A. 2008. A framework for context-aware authentication. In Proc. of IET 4th International Conference on Intelligent Environments, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  27. Ragab, A. H. M., Ismail, N. A., Allah, O. S. F. 2001. An efficient message digest algorithm (MD) for data security. Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology (TENCON). Vol. 1, 191--197. DOI= 10.1109/TENCON.2001.949578.Google ScholarGoogle ScholarCross RefCross Ref
  28. Habib, A., Xu, D., Atallah, M., Bhargava, B., Chuang, J. 2005. A tree-based forward digest protocol to verify data integrity in distributed media streaming. IEEE Transactions on Knowledge and Data Engineering. Vol. 17(7), 1010--1014. DOI= 10.1109/TKDE.2005.102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Cheng, X.-h., Deng, J.-z. 2010. Design of SHA-1 Algorithm Based on FPGA. In Proc. of 2nd International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC). Vol. 1, 532--534. DOI= 10.1109/NSWCTC.2010.131 Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Kitsos, P., Koufopavlou, O. 2004. Whirlpool hash function: architecture and VLSI implementation. In Proc. of the International Symposium on Circuits and Systems (ISCAS '04). Vol. 2, II - 893--6.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Anonymity preserving framework for location-based information services

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      MEDES '10: Proceedings of the International Conference on Management of Emergent Digital EcoSystems
      October 2010
      302 pages
      ISBN:9781450300476
      DOI:10.1145/1936254

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 October 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      MEDES '10 Paper Acceptance Rate26of93submissions,28%Overall Acceptance Rate267of682submissions,39%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader