2012 IEEE 13th International Conference on Mobile Data Management 2012
DOI: 10.1109/mdm.2012.23
|View full text |Cite
|
Sign up to set email alerts
|

Defending Location Privacy Using Zero Knowledge Proof Concept in Location Based Services

Abstract: The increasing trend of embedding positioning capabilities (e.g., GPS) in mobile devices facilitates the widespread use of Location Based Services. For such applications to succeed, privacy and confidentiality are key issues. Over all privacy will have to be managed through a combination of technology, legislation, corporate policy, and social norms. There are many data privacy schemes including Zero Knowledge Proof (ZKP) those can be used for location privacy. ZKP is also useful for removing the bottleneck pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…This is demonstrated, in the context of preservation of user privacy in location-based services, in [10].…”
Section: A Model To Preserve Privacymentioning
confidence: 92%
“…This is demonstrated, in the context of preservation of user privacy in location-based services, in [10].…”
Section: A Model To Preserve Privacymentioning
confidence: 92%
“…Jagwani and Kaushik [105] intended to prevent location information leaks using the concept of Zero knowledge proof (ZKP). The construction process of the authentication scheme based on ZKP was introduced; and the possible applications of ZKP in the location-based service domain were discussed.…”
Section: 2015mentioning
confidence: 99%
“…The p-anti-conspiration privacy model lacking protecting sensitive information Jagwani and Kaushik [105] 2012 Removing the dependency of using third party software Zero knowledge proof An authentication scheme is required Gao et al [106] 2013 Protecting the trajectory privacy A trajectory privacypreserving framework…”
Section: Clustering K-anonymity (Ck) Schemementioning
confidence: 99%
“…Jagwani et al [39] applied the middleware to help generate the certificate for a client in the form of a pseudonym, which is used by a Location-Based Service Provider (LSP) at the time of seeking a service to solve the problem in the middleware under bottleneck. ZKP was adopted for authentication.…”
Section: Related Workmentioning
confidence: 99%