Privacy Preservation in Location-based Mobile Applications: Research Directions

被引:7
作者
Patel, Asma [1 ]
Palomar, Esther [1 ]
机构
[1] Birmingham City Univ, Fac Technol Engn & Environm, Sch Comp Telecommun & Networks, Birmingham, W Midlands, England
来源
2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES) | 2015年
关键词
PROTECTION; SECURITY; ATTACKS;
D O I
10.1109/ARES.2014.37
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proliferation of mobile devices equipped with position sensors has made Location-based Service (LBS) increasingly popular. These mobile devices send user's actual location information to the third party location servers, which compile and, in some cases, share with other service providers. As a result, users aware of the privacy implications feel continuously tracked. Effective and, even more important, socially-accepted privacy enhancing technologies for these services have recently received a lot of attention in academia and industry. This paper presents an overview of the privacy preserving techniques currently applied by LBS applications. It classifies these techniques into a classification model consisting of three layers. Thus, a brief description of all the protocols, mechanisms and interfaces covering from the application layer to the network layer are presented, also providing a comparative analysis of current privacy-aware location solutions. To guide future research, a new perspective of the literature findings is proposed and research questions, methods and implications are discussed. Novel to related work, our classification embraces a holistic picture of approaching privacy-aware mobile LBS.
引用
收藏
页码:227 / 233
页数:7
相关论文
共 53 条
[1]  
3GPP, 2006, 23271 3GPP
[2]   Report from Dagstuhl: The Liberation of Mobile Location Data and its Implications for Privacy Research [J].
Andrienkoa, Gennady ;
Gkoulalas-Divanis, Aris ;
Gruteser, Marco ;
Kopp, Christine ;
Liebig, Thomas ;
Rechert, Klaus .
MOBILE COMPUTING AND COMMUNICATIONS REVIEW, 2013, 17 (02) :7-18
[3]  
Android, ANDR SEC OV
[4]  
[Anonymous], ACM Transactions on Information and System Security (TISSEC), DOI DOI 10.1145/290163.290168
[5]  
[Anonymous], 2011, NDSS
[6]  
[Anonymous], 2004, TOR 2 GENERATION ONI
[7]  
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[8]  
[Anonymous], 2012, TRUST TRUSTWORTHY CO
[9]  
[Anonymous], 2006, DYN MOB GIS INVESTIG
[10]  
[Anonymous], 2014, Communications of the ACM, DOI DOI 10.1145/2494522