Abstract:A variety of services utilizing users' positions have become available because of rapid advances in Global Positioning System (GPS) technologies. Since location information may reveal private information, preserving location privacy has become a significant issue. We proposed a dummy-based method of anonymizing location to protect this privacy in our previous work that generated dummies based on various restrictions in a real environment. However, the previous work assumed a simplified mobility model in which … Show more
“…The authors in [112], [113] propose dummy-based privacypreserving techniques which are based on assumptions that the movement plan of the user is known in advance. In a more realistic and refined approach [31], they propose a dummybased privacy-preserving technique to anonymize the location of users in real environments.…”
Section: ) Dummy-based Techniques In Mobile Networkmentioning
Abstract-Location-based Services (LBS) have gained popularity as a result of the advances in mobile and communication technologies. LBS provide users with relevant information based on their location. In spite of the desirable features provided by LBS, the geographic locations of users are not adequately protected. Location privacy is one of the major challenges in vehicular and mobile networks. In this article, we analyse the security and privacy requirements for LBS in vehicular and mobile networks. Specifically, this paper covers privacy enhancing technologies and cryptographic approaches that provide location privacy in vehicular and mobile networks. The different approaches proposed in literature are compared and open research areas are identified.
“…The authors in [112], [113] propose dummy-based privacypreserving techniques which are based on assumptions that the movement plan of the user is known in advance. In a more realistic and refined approach [31], they propose a dummybased privacy-preserving technique to anonymize the location of users in real environments.…”
Section: ) Dummy-based Techniques In Mobile Networkmentioning
Abstract-Location-based Services (LBS) have gained popularity as a result of the advances in mobile and communication technologies. LBS provide users with relevant information based on their location. In spite of the desirable features provided by LBS, the geographic locations of users are not adequately protected. Location privacy is one of the major challenges in vehicular and mobile networks. In this article, we analyse the security and privacy requirements for LBS in vehicular and mobile networks. Specifically, this paper covers privacy enhancing technologies and cryptographic approaches that provide location privacy in vehicular and mobile networks. The different approaches proposed in literature are compared and open research areas are identified.
“…Privacy Enhanced Trusted location based services (PE-TLBS) [18] focus to implement a simple protocol in which the user authenticate the server, while preserving anonymity and avoiding the possibility of their personal information leakage. The concept of dummy nodes proposes the use of dummy locations with the real location to protect the location privacy of the node [19]. The quality of requested service degrades when the number of dummy node increases.…”
“…This type of fashion makes privacy preservation of user collaboration no longer efficient, because they often submit queries with certain time delays. Thus, researchers have to go back to TTP for finding solutions and solutions of [1,3,4,7,9,10,26,27] are able to be classified into two categories: whole trajectory disturbance and subsequent locations generalization. As the adversary can obtain user's subtrajectory, algorithms of the whole trajectory disturbance are less suitable for continuous LBSs, so algorithms of subsequent locations generalization prosperous.…”
Section: Related Workmentioning
confidence: 99%
“…These algorithms can be classified into two main categories: the whole trajectory disturbance [1][2][3][4] and the subsequent location generalization [5][6][7][8][9][10]. As subtrajectories can be obtained before preserving, the adversary may infer the location correlation and identify the real trajectory from the anonymous group, which makes algorithms of whole trajectory disturbance failed.…”
Abstract:In location-based services of continuous query, it is easier than snapshot to confirm whether a location belongs to a particular user, because sole location can be composed into a trajectory by profile correlation. In order to cut off the correlation and disturb the sub-trajectory, an un-detective region called mix-zone was proposed. However, at the time of this writing, the existing algorithms of this type mainly focus on the profiles of ID, passing time, transition probability, mobility patterns as well as road characteristics. In addition, there is still no standard way of coping with attacks of correlating each location by mining out query content and time interval from the subtrajectory. To cope with such types of attack, users have to generalize their query contents and time intervals similarity. Hence, this paper first provided an attack model to simulate the adversary correlating the real location with a higher probability of query content and time interval similarity. Then a user collaboration mix-zone (CoMix) that can generalize these two types of profiles is proposed, so as to achieve location privacy. In CoMix, each user shares the common profile set to lowering the probability of success opponents to get the actual position through the correlation of location. Thirdly, entropy is utilized to measure the level of privacy preservation. At last, this paper further verifies the effectiveness and efficiency of the proposed algorithm by experimental evaluations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.