Proposed Authentication Model for Location Based Queries

Authors

  • Roshan S. Deshmukh Dept. of CSE, Prof.Ram Meghe College of Engineering and Management, Mumbai, India
  • D.G. Harkut Dept. of CSE, Prof.Ram Meghe College of Engineering and Management, Mumbai, India

Keywords:

Location Based Services, Location Server, Path Confusion, Private Information Retrieval, K-anonymity

Abstract

the popularity of location-based services leads to serious concerns on user privacy. It is very easy for a person to know his/her location with the help of devices having GPS facility. When user’s location is provided to Location Based Services (LBS), it is possible for user to know all location dependent information like location of friends or Nearest Restaurant, whether or traffic conditions. The massive use of mobile devices paves the way for the creation of wireless networks that can be used to exchange information. When the exchange of information is done amongst entrusted parties, the privacy of the user could be in harmful. Existing protocol doesn’t work on many different mobile devices and another issue is that, Location Server (LS) should provide misleading data to user. This gives rise to new challenges and reconsideration of the existing privacy metrics.

 

References

A. Beresford and F. Stajano, “Location privacy in pervasive comput,”IEEE Pervasive Computing., vol. 2, no. 1, pp. 46–55, Jan.–Mar.2003.

B. Palanisamy and L. Liu, “MobiMix: Protecting location privacy with mix-zones over road networks,” in Proc. ICDE, Hannover, Germany, pp. 494–505, 2011.

C. Bettini, X. Wang, and S. Jajodia, “Protecting privacy against location-based personal identification,” in Proc. 2nd VDLB Int. Conf. SDM, W. Jonker and M. Petkovic, Eds., Trondheim, Norway, pp. 185–199, LNCS 3674, 2005.

B. Gedik and L. Liu, “Location privacy in mobile systems: A personalized anonymization model,” in Proc. ICDCS, Columbus, OH, USA, pp. 620–629, 2005.

M. Gruteser and D. Grunwald, “Anonymous usage of location based services through spatial and temporal cloaking,” in Proc.1st Int. Conf. MobiSys, pp. 31–42, 2003.

L. Sweeney, “k-Anonymity: A model for protecting privacy,” Int. J. Uncertain. Fuzziness Knowl. Based Syst., vol. 10, no. 5, pp. 557–570, Oct. 2002.

S. Mascetti and C. Bettini, “A comparison of spatial generalization algorithms for lbs privacy preservation,” in Proc. Int. Mobile Data Manage., Mannheim, Germany, pp. 258–262, 2007.

M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new Casper: Query processing for location services without compromising privacy,” in Proc. VLDB, Seoul, Korea, pp. 763–774, 2006.

L. Marconi, R. Pietro, B. Crispo, and M. Conti, “Time warp: How time affects privacy in LBSs,” in Proc. ICICS, Barcelona, Spain, pp. 325–339, 2010.

T. Xu and Y. Cai, “Feeling-based location privacy protection for location-based services,” in Proc. 16th ACM CCS, Chicago, IL,USA, pp. 348–357, 2009.

X. Chen and J. Pang, “Measuring query privacy in location-based services,” in Proc. 2nd ACM CODASPY, San Antonio, TX, USA, pp. 49–60, 2012.

B. Hoh and M. Gruteser, “Protecting location privacy through path confusion,” in Proc. 1st Int. Conf. SecureComm, pp. 194–205, 2005.

P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Trans. Knowl. Data Eng., vol. 19, no. 12, pp. 1719–1733, Dec. 2007.

M. Damiani, E. Bertino, and C. Silvestri, “The PROBE framework for the personalized cloaking of private locations,” Trans. Data Privacy, vol. 3, no. 2, pp. 123–148, 2010.

T. Hashem and L. Kulik, “Safeguarding location privacy in wireless ad-hoc networks,” in Proc. 9th Int. Conf. UbiComp, Innsbruck, Austria, pp. 372–390, 2007.

M. Duckham and L. Kulik, “A formal model of obfuscation and negotiation for location privacy,” in Proc. 3rd Int. Conf. Pervasive Comput., H. Gellersen, R. Want, and A. Schmidt, Eds., pp. 243–251, LNCS 3468, 2005.

H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services,” in Proc. Int. Conf. ICPS, pp. 88–97, 2005.

J. Krumm, “A survey of computational location privacy,” Pers. Ubiquitous Comput., vol. 13, no. 6, pp. 391–399, Aug. 2009.

G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, “Private queries in location based services: Anonymizers are not necessary,” in Proc. ACM SIGMOD, Vancouver, BC, Canada, pp. 121–132, 2008.

B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, “Private information retrieval,” J. ACM, vol. 45, no. 6, pp. 965–981, 1998.

E. Kushilevitz and R. Ostrovsky, “Replication is not needed: Single database, computationally-private information retrieval,” in Proc. FOCS, Miami Beach, FL, USA, pp. 364–373, 1997.

G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, “A hybrid technique for private location-based queries with database protection,” in Proc. Adv. Spatial Temporal Databases, N. Mamoulis, T. Seidl, T. Pedersen, K. Torp, and I. Assent, Eds., Aalborg, Denmark, pp. 98–116, LNCS 5644, 2009.

G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, “Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection,” GeoInformatica, vol. 15, no. 14, pp. 1–28, 2010.

P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Proc. EUROCRYPT, vol. 1592, Prague, Czech Republic, pp. 223–238, 1999.

Downloads

Published

2017-08-30

How to Cite

[1]
R. S. Deshmukh and D. Harkut, “Proposed Authentication Model for Location Based Queries”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 5, no. 4, pp. 66–69, Aug. 2017.

Issue

Section

Review Article

Similar Articles

<< < 4 5 6 7 8 9 10 11 12 13 > >> 

You may also start an advanced similarity search for this article.