2018
DOI: 10.4018/ijaci.2018010102
|View full text |Cite
|
Sign up to set email alerts
|

Improving Privacy and Security of User Data in Location Based Services

Abstract: Location Based Services (LBS) expose user data to malicious attacks. Approaches, evolved, so far, for preserving privacy and security, suffer from one or more anomalies, and hence the problem of securing LBS data is far from being resolved. In particular, accuracy of results vs. privacy degree, privacy vs. performance, and trust between users are open problems. In this article, we present a novel approach by integration of peer-to-peer (P2P) with the caching technique and dummies from real queries. Our approac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 89 publications
(43 citation statements)
references
References 36 publications
0
43
0
Order By: Relevance
“…5. Some applications of Fog computing can be found in [14][15][16]. More results on Fog computing are also available in [17][18][19].…”
Section: Fog Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…5. Some applications of Fog computing can be found in [14][15][16]. More results on Fog computing are also available in [17][18][19].…”
Section: Fog Computingmentioning
confidence: 99%
“…Some applications of IoT in the field of crowd management are discussed in [14]. Some applications in of IoT in the context of privacy and security are discussed in [15,16]. Some of the key devices and associated technologies to IoT include RFID Tags [25], Internet, computers, cameras, RFID, Mobile Devices, coloured lights, RFIDs, Sensors, Sensor networks, Drones, Cloud, Fog and Dew.…”
Section: Dew Computingmentioning
confidence: 99%
“…Jinnah was suffering from tuberculosis which was slowly but surely killing him. In [28,36,37], privacy issues of data are discussed.…”
Section: Big Medical Data Analyticsmentioning
confidence: 99%
“…In pursuit of a resolution of trust issue, some researchers have proposed an idea of exchanging some information about previously visited area among peers to create a robust cloak area, which paved the way to consider storing some information on the client side [32]. The method in [23] used cache in TTP to store answers of some queries of users for the purpose of using them in future. It increased the privacy and performance level but resulted in decreasing the number of connections to server.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Existing approaches are designed to defend privacy from an outer attacker, server provider, and all other types of attacks [21] by protecting one or more components. The methods or approaches for privacy of data in LBS, as in [22], may be grouped into eight classes, namely, Each one of them has one or more kind of limitations and consolidated open problems [21][22][23][24][25], which are described below.…”
Section: Introductionmentioning
confidence: 99%