Reference Hub8
Memorizing Algorithm: Protecting User Privacy using Historical Information of Location–Based Services

Memorizing Algorithm: Protecting User Privacy using Historical Information of Location–Based Services

Quynh Chi Truong, Anh Tuan Truong, Tran Khanh Dang
Copyright: © 2010 |Volume: 2 |Issue: 4 |Pages: 22
ISSN: 1937-9412|EISSN: 1937-9404|EISBN13: 9781613502617|DOI: 10.4018/jmcmc.2010100104
Cite Article Cite Article

MLA

Truong, Quynh Chi, et al. "Memorizing Algorithm: Protecting User Privacy using Historical Information of Location–Based Services." IJMCMC vol.2, no.4 2010: pp.65-86. http://doi.org/10.4018/jmcmc.2010100104

APA

Truong, Q. C., Truong, A. T., & Dang, T. K. (2010). Memorizing Algorithm: Protecting User Privacy using Historical Information of Location–Based Services. International Journal of Mobile Computing and Multimedia Communications (IJMCMC), 2(4), 65-86. http://doi.org/10.4018/jmcmc.2010100104

Chicago

Truong, Quynh Chi, Anh Tuan Truong, and Tran Khanh Dang. "Memorizing Algorithm: Protecting User Privacy using Historical Information of Location–Based Services," International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 2, no.4: 65-86. http://doi.org/10.4018/jmcmc.2010100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The rapid development of location-based services, which make use of the location information of the user, presents both opportunities and challenges. Users can benefit from these services; however, they must often disclose their location information, which may lead to privacy problems. In this regard, the authors propose a solution with a memorizing algorithm, using trusted middleware that organizes space in an adaptive grid where it cloaks the user’s location information in an anonymization area before sending it to the service providers. This newly introduced memorizing algorithm calculates on the spatial grid to decrease the overlapped areas as much as possible, which helps conceal users’ locations. This solution protects the user’s privacy while using the service, but also against data mining techniques with respect to their history location data. Experimental results with a user activities map establishes this theoretical analyses as well as the practical value of the proposed solution.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.