Privacy Preservation in Location Based Services

被引:2
作者
Shivaprasad, Sahana [1 ]
Li, Huian [1 ]
Zou, Xukai [1 ]
机构
[1] Purdue Univ, Dept Comp & Informat Sci, Indianapolis, IN 46202 USA
关键词
Location based service; location privacy attack; privacy preservation;
D O I
10.17706/jcp.11.5.411-422
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Location based service (LBS) is one of the most popular mobile services today, which offers wide range of services that are based on information about the physical location of a user or device. Typical LBS includes real-time turn-by-turn directions, points of interest (POI), and social network services such as Facebook, Foursquare, Loopt, and Qype. However, user location privacy is a major concern in today's mobile applications and there has been significant research dedicated to address this issue. Various location privacy preserving mechanisms (LPPM) have been used to preserve privacy of the location information of mobile users. This survey aims to present privacy preserving mechanisms employed in the location based services. Moreover, the LPPMs are classified into cryptographic and non-cryptographic mechanisms, and a taxonomy of mechanisms is also discussed. Multiple defense mechanism attributes/goals for the protection of location privacy have been described in the literature. Furthermore, classification and comparison of different mechanisms and location privacy attacks are presented based on their protection attributes and adversarial goals. Strengths and weaknesses of different mechanisms are also highlighted.
引用
收藏
页码:411 / 422
页数:12
相关论文
共 37 条
  • [1] Ardagna CA, 2007, LECT NOTES COMPUT SC, V4602, P47
  • [2] Bamba B., 2008, P 17 INT C WORLD WID, P237, DOI DOI 10.1145/1367497.1367531
  • [3] Mix zones: User privacy in location-aware services
    Beresford, AR
    Stajano, F
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 127 - 131
  • [4] Location privacy in pervasive computing
    Beresford, AR
    Stajano, F
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 46 - 55
  • [5] Bettini C, 2009, LECT NOTES COMPUT SC, V5599, P1, DOI 10.1007/978-3-642-03511-1_1
  • [6] Bindschaedler L., 2012, NDSS 12
  • [7] Chow C.-Y., 2011, SIGKDD EXPLOR NEWSL, V13, P19, DOI DOI 10.1145/2031331.2031335
  • [8] Durr F, 2011, INT CONF PERVAS COMP, P189, DOI 10.1109/PERCOM.2011.5767584
  • [9] Location privacy in mobile systems: A personalized anonymization model
    Gedik, B
    Liu, L
    [J]. 25th IEEE International Conference on Distributed Computing Systems, Proceedings, 2005, : 620 - 629
  • [10] Protecting location privacy with personalized k-anonymity:: Architecture and algorithms
    Gedik, Bugra
    Liu, Ling
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 1 - 18