skip to main content
10.1145/2523616.2525956acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Decentralized privacy protection strategies for location-based services

Published:01 October 2013Publication History

ABSTRACT

The rapid development of the integration of cloud computing and location-based services have drawn so much attention currently. With the increasing number of users who own smart phones, significant amount of data that describe user surrounding information and interests have become widely available. However, significant attentions have been raised on the privacy issues. The existing approaches mainly focus on a centralized approach which brings tremendous security concerns. To prevent a centralized query processor from being attached by malicious hackers, we propose a decentralized approach to protect the sensitive location information of users who request for location-based services. Our system provides an approximate computing and an exact computing mechanism for different scenarios and requirements.

References

  1. H. Lee, B.-S. Oh, H.-I. Kim, and J.-W. Chang. Grid-based cloaking area creation scheme supporting continuous location-based services. In SAC, pages 537--543, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. K. Shin, X. Ju, Z. Chen, and X. Hu. Privacy protection for users of location-based services. In Wireless Communications, IEEE, pages 30--39, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  3. R. Shokri, C. Troncoso, C. Diaz, J. Freudiger, and J.-P. Hubaux. Unraveling an old cloak: k-anonymity for location privacy. In Proceedings of the 9th annual ACM workshop on Privacy in the electronic society, WPES '10, pages 115--118, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Decentralized privacy protection strategies for location-based services

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                SOCC '13: Proceedings of the 4th annual Symposium on Cloud Computing
                October 2013
                427 pages
                ISBN:9781450324281
                DOI:10.1145/2523616

                Copyright © 2013 Owner/Author

                Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 October 2013

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                SOCC '13 Paper Acceptance Rate23of114submissions,20%Overall Acceptance Rate169of722submissions,23%
              • Article Metrics

                • Downloads (Last 12 months)1
                • Downloads (Last 6 weeks)1

                Other Metrics

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader