Preserving location Privacy in Peer-to-Peer Environments

被引:1
|
作者
Deb, Rupam [1 ]
Kazary, Sumaya [2 ]
Islam, Kazi Rafiqul [2 ]
Ahmed, Reaz [2 ]
机构
[1] Dhaka Univ Engn & Technol, CSE Dept, Gazipur 1700, Bangladesh
[2] Dhaka Univ Engn & Technol, BUET, CSE & EEE Dept, Dhaka, Bangladesh
关键词
LBS; Privacy Preserve; Chord; Peer-to-peer network;
D O I
10.1109/DSDE.2010.26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In modern age portable handheld devices are changing the norms of traditional communication structure by introducing mobility and dynamism. In general when a mobile client wants services from a database server, the client has to continuously report its location to the server. With untrustworthy servers, location-based services (LBS) may pose a major privacy threat on its users. In this paper, we propose an efficient architecture to tackle this privacy threat. In the proposed architecture a client's location and messages are hidden from the database server as well as other clients in the network. In this paper, we define the location privacy preservation protocol and analysis the protocol in different threat situations.
引用
收藏
页码:49 / 53
页数:5
相关论文
共 50 条
  • [1] Collaborative Caching Techniques for Privacy-Preserving Location-based Services in Peer-to-Peer Environments
    Jung, Kangsoo
    Park, Seog
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4497 - 4506
  • [2] Enhanced peer-to-peer anonymity approach for privacy preserving in location-based services
    Elabd, Emad
    JOURNAL OF LOCATION BASED SERVICES, 2020, 14 (04) : 252 - 267
  • [3] Privacy-Preserving Clustered Peer-to-Peer Learning
    Zheng, Xue
    Yener, Aylin
    FIFTY-SEVENTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, IEEECONF, 2023, : 704 - 708
  • [4] A TRAJECTORY PRIVACY PRESERVING METHOD IN PEER-TO-PEER LBS SYSTEM
    Guo Yanhua
    Guo Yimin
    Guo Yajun
    Wang Caimei
    MECHANICAL ENGINEERING AND GREEN MANUFACTURING, PTS 1 AND 2, 2010, : 571 - 575
  • [5] Privacy preserving reputation inquiry in a peer-to-peer communication environment
    Sy, Bon K.
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 183 - 190
  • [6] Lightweight Privacy-Preserving Peer-to-Peer Data Integration
    Zhang, Ye
    Wong, Wai-Kit
    Yiu, S. M.
    Mamoulis, Nikos
    Cheung, David W.
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (03): : 157 - 168
  • [7] A peer-to-peer approach to resource location in grid environments
    Iamnitchi, A
    Foster, I
    Nurmi, DC
    11TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE DISTRIBUTED COMPUTING, PROCEEDINGS, 2002, : 419 - 419
  • [8] A Dual-active Spatial Cloaking Algorithm for Location Privacy Preserving in mobile Peer-to-Peer Networks
    Che, Yanzhe
    Yang, Qiang
    Hong, Xiaoyan
    2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,
  • [9] Secure and user privacy-preserving searching in peer-to-peer networks
    Sen, Jaydip
    LOGIC JOURNAL OF THE IGPL, 2013, 21 (04) : 603 - 629
  • [10] Asynchronous privacy-preserving iterative computation on peer-to-peer networks
    J. A. M. Naranjo
    L. G. Casado
    Márk Jelasity
    Computing, 2012, 94 : 763 - 782