Comprehensive Review: Privacy Protection of User in Location-Aware Services of Mobile Cloud Computing

被引:51
作者
Almusaylim, Zahrah A. [1 ]
Jhanjhi, N. Z. [2 ]
机构
[1] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, Al Hasa, Saudi Arabia
[2] Taylors Univ, Sch Comp & IT SoCIT, Lakeside Campus, Subang Jaya, Malaysia
关键词
Mobile computing; Cloud computing; Mobile cloud computing; LBS; Location-aware; Privacy; Encryptions; K-ANONYMITY; CHALLENGES; SECURITY; ATTACKS; FINE;
D O I
10.1007/s11277-019-06872-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
One of the recent trends of networking and mobile technology is mobile cloud computing (MCC) that provides rich computational, storage resources and services in clouds to mobile users. MCC applications provide a variety of services to users and one of them is the location-based services (LBS) applications that are widely spread. By using mobile applications and LBS, mobile devices act as a thin client where the abundant data locations are collected and stored at the mobile cloud to provide corresponding services. Privacy of the user's location has been a renewed research interest and extensively studied in recent years. However, privacy is one of the most important challenges in MCC because the user's location on mobile devices is offloaded from mobile devices to cloud providers which can be utilized by third parties. Since protecting the privacy of the user is the key to maintain the trust on the mobile environment. LBS faces issues in protecting privacy such as, the privacy of user's current location, which may contain private information. In case, if the user's current location is compromised through unauthorized access, it possibly results in severe consequences. Therefore, protecting location privacy of the user while achieving precise location is still a challenge in MCC. This comprehensive research review will provide the challenge of protecting the privacy of user's location in MCC; analyze several related works regarding the issue. In addition, it suggests possible solutions related to the issue, in lighted few shortcomings which still needs attention with few related case studies.
引用
收藏
页码:541 / 564
页数:24
相关论文
共 77 条
[1]  
Abbas Fizza, 2013, 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (UCC), P60, DOI 10.1109/UCC.2013.26
[2]  
Ahmed AA, 2017, 2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), P75, DOI 10.1109/AINS.2017.8270428
[3]  
Alam Md Imran, 2015, International Journal of Information Technology and Computer Science, V7, P68, DOI 10.5815/ijitcs.2015.02.09
[4]  
Almusaylim Z. A., 2018, WIREL NETW, P1
[5]  
Almusaylim ZA, 2018, 2018 4 INT C COMPUTE, P1, DOI DOI 10.1109/ICCOINS.2018.8510588
[6]  
Andres M. E., 2013, ACM CCS, P901
[7]  
[Anonymous], 2016, GARTN SAYS 2020 CLOU
[8]  
[Anonymous], 2014, Cloud Computing: Paradigms and Technologies, DOI DOI 10.1007/978-3-642-35016-0_2
[9]  
[Anonymous], 2013, P 2 ACM SIGCOMM WORK
[10]  
[Anonymous], 2014, Journal of Software Engineering and Applications, DOI DOI 10.4236/JSEA.2014.78063