Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2017
DOI: 10.1145/3098243.3098268
|View full text |Cite
|
Sign up to set email alerts
|

Resilient privacy protection for location-based services through decentralization

Abstract: and RISE SICS, SwedenLocation-based Services (LBSs) provide valuable services, with convenient features for mobile users. However, the location and other information disclosed through each query to the LBS erodes user privacy. This is a concern especially because LBS providers can be honest-but-curious, collecting queries and tracking users' whereabouts and infer sensitive user data. This motivated both centralized and decentralized location privacy protection schemes for LBSs: anonymizing and obfuscating LBS … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 49 publications
0
10
0
Order By: Relevance
“…There are many schemes implementing caching mechanism to help protect privacy and improve user experience, such as [15], [48]- [52], and most of them cache data in peers. In [48], some special peers run as serving nodes who are responsible for caching all POI data for the region it is located in and serve neighboring peers' queries. Serving nodes are determined by a TTP-like entity and serving nodes themselves act like TTPs.…”
Section: Distributed P2p-based Schemesmentioning
confidence: 99%
“…There are many schemes implementing caching mechanism to help protect privacy and improve user experience, such as [15], [48]- [52], and most of them cache data in peers. In [48], some special peers run as serving nodes who are responsible for caching all POI data for the region it is located in and serve neighboring peers' queries. Serving nodes are determined by a TTP-like entity and serving nodes themselves act like TTPs.…”
Section: Distributed P2p-based Schemesmentioning
confidence: 99%
“…However, the above P2P approaches are not reliable when there are malicious peers in the network. To secure the P2P scheme, Jin et al [23,24] introduced the pseudonymous authentication technique to provide message authentication and integrity for peer communication, thus significantly suppressing the impact of malicious peers.…”
Section: Related Workmentioning
confidence: 99%
“…Spatial cloaking [17][18][19][20][21][22][23][24][25] is a fairly popular mechanism. Chow et al [17] propose Casper cloak algorithm, which uses a quad-tree data structure and allows users to determine the size of and the minimum anonymous area, but the privacy can be guaranteed only when users' positions are distributed evenly.…”
Section: Related Workmentioning
confidence: 99%
“…Chow et al [17] propose Casper cloak algorithm, which uses a quad-tree data structure and allows users to determine the size of and the minimum anonymous area, but the privacy can be guaranteed only when users' positions are distributed evenly. Jin and Papadimitratos [18] allow P2P responses to be validated with very low fraction of queries affected even if a significant fraction of nodes are compromised. Chen and Pang [21] propose that the cloaking region is randomly chosen from the ones with top-k largest position entropy.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation