Preserving User Location Privacy for Location-Based Service

被引:4
作者
Chen, Xiaojuan [1 ,2 ]
Mu, Yi [2 ]
机构
[1] Southwest Univ, Dept Informat Management, Rongchang Campus, Chongqing, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
来源
GREEN, PERVASIVE, AND CLOUD COMPUTING | 2016年 / 9663卷
关键词
Location privacy; Security; Applied cryptography; K-ANONYMITY; ANONYMIZATION; QUERIES;
D O I
10.1007/978-3-319-39077-2_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location privacy has been a great concern to users who need the location based service on networked devices such as mobile phones and personal computers. Location based service usually relies on a location server, which is commonly regarded as semi-trusted or honest-but-curious. To protect user privacy their location information must be protected against the location server. We propose a protocol which captures user location privacy, while the user can still receive the requested service from a service provider, and does not reveal the user's exact location to the location server. Our approach offers the applicability to real-world applications.
引用
收藏
页码:290 / 300
页数:11
相关论文
共 25 条
[1]  
[Anonymous], PROCEEDINGS
[2]  
[Anonymous], 2011, NDSS
[3]  
[Anonymous], 2003, P 1 INT C MOB SYST A
[4]   GLP: A cryptographic approach for group location privacy [J].
Ashouri-Talouki, Maede ;
Baraani-Dastjerdi, Ahmad ;
Selcuk, Ali Aydin .
COMPUTER COMMUNICATIONS, 2012, 35 (12) :1527-1533
[5]   Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices [J].
Bilogrevic, Igor ;
Jadliwala, Murtuza ;
Joneja, Vishal ;
Kalkan, Kubra ;
Hubaux, Jean-Pierre ;
Aad, Imad .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) :1141-1156
[6]  
Cheng R, 2006, LECT NOTES COMPUT SC, V4258, P393
[7]   Private information retrieval [J].
Chor, B ;
Goldreich, O ;
Kushilevitz, E ;
Sudan, M .
JOURNAL OF THE ACM, 1998, 45 (06) :965-982
[8]  
Chow CY, 2007, LECT NOTES COMPUT SC, V4605, P258
[9]  
Damiani ML, 2008, INT FED INFO PROC, V263, P231
[10]  
Gahi Youssef, 2012, J INFORM SECURITY, V3, P105