skip to main content
10.1145/3206129.3239418acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicemtConference Proceedingsconference-collections
research-article

Users' Privacy Protection Scheme in Location Based Services

Authors Info & Claims
Published:02 July 2018Publication History

ABSTRACT

LBS (Location Based Service) has become more and more popular in recent years. LBS allows Users to explore the surrounding environment. Users need to transmit their information such as position, POI, identification to untrusted service provider who can be considered as an attacker. By using those data, the attacker may obtain users' privacy. Therefore, there is an increasing amount of research to protect the privacy of users when using the LBSs. Our research aims to improve the shortcomings of past protection methods. In the experiment, our approach is compared with other approaches by using entropy and our approach can provide better protection in three kinds of side information applications.

References

  1. Shin, K. G., Ju, X., Chen, Z., and Hu, X. 2012. Privacy protection for users of location-based services. Wireless Communications. 19, 1 (Feb. 2012), 30--39. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  2. Bilogrevic, I., Jadliwala, M., Kalkan, K., Hubaux, J. P., and Aad, I. 2011. Privacy in mobile computing for location-sharing-based services. International Symposium on Privacy Enhancing Technologies Symposium 77--96. Springer, Berlin, Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Peddinti, S. T., Dsouza, A., and Saxena, N. 2011. Cover locations: availing location-based services without revealing the location. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society (Chicago, Illinois, USA, Oct. 17-17, 2011). WPES '11. ACM, New York, NY, 143--152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Lu, H., Jensen, C. S., and Yiu, M. L. 2008. Pad: privacy-area aware, dummy-based location privacy in mobile services. In Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access (Vancouver, Canada, June 13-13, 2008). MobiDE '08. ACM, New York, NY, 16--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Niu, B., Li, Q., Zhu, X., Cao, G., and Li, H. 2014. Achieving k-anonymity in privacy-aware location-based services. In Proceedings of the INFOCOM (Toronto, ON, Canada, 27 April-2 May, 2014). IEEE, 754--762.Google ScholarGoogle Scholar
  6. Niu, B., Zhu, X., Li, W., Li, H., Wang, Y., and Lu, Z. 2015.A personalized two-tier cloaking scheme for privacy-aware location-based services. In Proceedings of the Computing, Networking and Communications (Garden Grove, CA, USA, Feb. 16-19, 2015), IEEE, 94--98.Google ScholarGoogle Scholar
  7. Gruteser, M., & Grunwald, D. 2003. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services (San Francisco, California, May 05-08, 2003). MobiSys '03. ACM, New York, NY, 31--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Shokri, R., Theodorakopoulos, G., Le Boudec, J. Y., and Hubaux, J. P. 2011. Quantifying location privacy. In Proceedings of the Security and privacy (Berkeley, CA, USA, May 22-25, 2011), IEEE, 247--262. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Sweeney, L. 2002. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 05(October 2002), 557--570. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Machanavajjhala, A., Gehrke, J., Kifer, D., and Venkitasubramaniam, M. 2006. l-diversity: Privacy beyond k-anonymity. In Proceedings of the 22nd International Conference on Data Engineering (Atlanta, GA, USA, USA, April 3-7, 2006). IEEE, 24--24. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Users' Privacy Protection Scheme in Location Based Services

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICEMT '18: Proceedings of the 2nd International Conference on Education and Multimedia Technology
      July 2018
      127 pages
      ISBN:9781450365253
      DOI:10.1145/3206129

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 July 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader