A Privacy Protection Mechanism for Location-based Mobile Coupons

被引:0
作者
Kazeminia, Alireza [1 ]
Ghahfarokhi, Behrouz Shahgholi [1 ]
机构
[1] Univ Isfahan, Dept Informat Technol Engn, Esfahan, Iran
来源
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013) | 2013年
关键词
location privacy; location-based services; mobile coupons; privacy protection mechanism;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Mobile technologies have created unprecedented opportunities for innovative marketing strategies. Location-based mobile coupons are at the cutting edge of these strategies. They provide a method to offer deals to mobile customers based on where they are at a certain time. However, revealing one's location in exchange for a service poses privacy threats ranging from discovery of personal details to being watched or tracked. This paper proposes a novel privacy protection mechanism for location-based coupons using an anonymous authentication method. The proposed mechanism protects against two adversaries: a global adversary that observes all the exchanged location information and an eavesdropper that listens to the communications on the wireless channel. It ensures user privacy and anonymity and prevents users from being tracked using self-generated pseudonyms. Furthermore, restriction applied on pseudonyms avoids all coupons to be grabbed by a greedy user.
引用
收藏
页码:202 / 206
页数:5
相关论文
共 14 条
[1]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[2]  
Duckham M., 2006, Dynamic and Mobile GIS: Investigating Changes in Space and Time, P34
[3]  
Fielding RaRT, 2000, PhD Dissertation
[4]  
Gutscher A., 2006, Proceedings. 20th International Parallel and Distributed Processing Symposium (IEEE Cat. No.06TH8860)
[5]  
Kido H, 2005, INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES 2005, PROCEEDINGS, P88
[6]   A survey of computational location privacy [J].
Krumm, John .
PERSONAL AND UBIQUITOUS COMPUTING, 2009, 13 (06) :391-399
[7]   Performance Overhead Among Three Hypervisors: An Experimental Study using Hadoop Benchmarks [J].
Li, Jack ;
Wang, Qingyang ;
Jayasinghe, Deepal ;
Park, Junhee ;
Zhu, Tao ;
Pu, Calton .
2013 IEEE INTERNATIONAL CONGRESS ON BIG DATA, 2013, :9-16
[8]  
Li M., 2006, P 5 ACM WORKSH PRIV, P18
[9]  
Meyerowitz J, 2009, FIFTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM 2009), P345
[10]  
Microsoft Inc, WIND PHON EM