"Don't trust anyone": Privacy protection for location-based services

被引:34
作者
Hashem, Tanzima [1 ]
Kulik, Lars [1 ]
机构
[1] Univ Melbourne, Dept Comp Sci & Software Engn, Melbourne, Vic 3010, Australia
关键词
Anonymity; Location-based service; Obfuscation; Privacy; Trust; K-ANONYMITY; ANONYMIZATION;
D O I
10.1016/j.pmcj.2010.04.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a decentralized approach that exploits the capability of mobile devices to form wireless personal ad-hoc networks in order to protect the privacy of users who access location-based services. The novelty of our approach is that users do not need to trust any party such as an intermediary server or peers with their locations and identities. We propose efficient algorithms for users to compute a k-anonymous imprecise location and to randomly select one of her peers with uniform probability who forwards the service request on behalf of the user. Our experimental evaluation shows that using our approach a user can enjoy a high quality of service with a high degree of privacy. (C) 2010 Elsevier B.V. All rights reserved.
引用
收藏
页码:44 / 59
页数:16
相关论文
共 32 条
[1]  
Bettini C, 2005, LECT NOTES COMPUT SC, V3674, P185
[2]  
Brands S., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P302
[3]   BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems [J].
Chang, Chao-Tsun ;
Chang, Chih-Yung ;
Sheu, Jang-Ping .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (10) :1243-1258
[4]  
Chow CY, 2009, LECT NOTES COMPUT SC, V5644, P283, DOI 10.1007/978-3-642-02982-0_19
[5]  
Chow Chi- Yin., 2006, ACM-GIS, P171
[6]   Modelling incentives for collaboration in mobile ad hoc networks [J].
Crowcroft, J ;
Gibbens, R ;
Kelly, F ;
Östring, S .
PERFORMANCE EVALUATION, 2004, 57 (04) :427-439
[7]  
Duckham M, 2005, LECT NOTES COMPUT SC, V3468, P152
[8]   Location privacy in mobile systems: A personalized anonymization model [J].
Gedik, B ;
Liu, L .
25th IEEE International Conference on Distributed Computing Systems, Proceedings, 2005, :620-629
[9]   Protecting location privacy with personalized k-anonymity:: Architecture and algorithms [J].
Gedik, Bugra ;
Liu, Ling .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) :1-18
[10]  
Ghinita G., 2007, Proceedings of 16th International Conference on World Wide Web, P371, DOI DOI 10.1145/1242572.1242623