LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Arunkumar, S.; Srivatsa, M.; Rajarajan, M. (2014)
Languages: English
Types: Unknown
Subjects: T1
Enforcing security in location based services is very crucial in the current mobile world. Past literature has examined both location and identity obfuscation techniques in order to optimally tradeoff security/privacy with utility − this primarily addresses the ‘how to enforce location security problem’; however, it does not address the ‘where to enforce location security problem’. This paper examines the ‘where’ problem and in particular, examines tradeoffs between enforcing location security at a device vs. enforcing location security at an edge location server. This paper also sketches an implementation of location security solutions at both the device and the edge location server and presents detailed experiments using real mobility and user profile data sets collected from various data sources (taxicabs, Smartphones). Our results show that while device-based solutions do not require trust in the edge location server, they either suffer from high false positive rate (about 25% probability of not meeting the desired security requirement) or low utility (about 600 meters higher error in obfuscated location data).
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] D. R. L. P. C. Bettini and S. Jajodia. Preserving anonymity of recurrent location-based queries. In 16th International Symposium on Temporal Representation and Reasoning, IEEE Computer Society, 2009.
    • [2] H.-Y. Chien. New efficient user authentication scheme with user anonymity facilitating e-commerce applications. In 9th IEEE International Conference on ECommerce Technology, 2007.
    • [3] M. Chowdhury S. Hasan, Sheikh I. Ahamed. A privacy enhancing approach for identity inference protection in location-based services. In 33rd Annual IEEE International Computer Software and Applications Conference, 2009.
    • [4] J. V. H Shin, V Atluri. A profile anonymization model for privacy in a personalized location based service environment. In 9th International Conference on Mobile Data Management. MDM'08,, pages 73-80, 2008.
    • [5] G. K. M E Skarkala and S. Gritzalis. Milc: A secure and privacy-preserving mobile instant locator with chatting. In Springer Science plus Business Media, LLC, 2010.
    • [6] C. Y. C. M. F. Mokbel and W. G. Aref. The new casper: Query processing for location services without compromising privacy. In In Proc. of VLDB, 2006.
    • [7] D. P.Deivanai, Mrs .J. Jesu Vedha Nayahi. A hybrid data anonymization integrated with suppression for preserving privacy in mining multi party data. In IEEE-International Conference on Recent Trends in Information Technology, ICRTIT, 2011.
    • [8] K. Puttaswamy and B. Zhao. Preserving privacy in location-based mobile social applications. In In HotMobile, pages 1-6, 2010.
    • [9] J. F. R Shokri and J.-P. Hubaux. A unified framework for location privacy. In In HotPETS, 2010.
    • [10] W. X. S. W Song. In-device spatial cloaking for mobile user privacy assisted by the cloud. In Eleventh International Conference on Mobile Data Management (MDM), pages 381-386, 2010.
    • [11] S. W. G.-H. T. R. G. T. H. K. L. H. T. K. Warr and M. Zafer. Mobile micro-cloud: Application classification, mapping, and deployment. In Proc. of Annual Fall Meeting of ITA (AMITA) 2013, Oct. 2013., 2013.
    • [12] R. W. Z Liang. Efficient k-anonymization for privacy preservation. In Computer Supported Cooperative Work in Design, 12th International Conference, pages 737- 742, 2008.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article