Advertisement

Improved Privacy Preserving Score-Based Location K-Anonymity in LBS

  • Lakshmi Prasanna Yeluri
  • E. Madhusudhana Reddy
Chapter
  • 30 Downloads
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 103)

Abstract

The extensive use of the location-based services in today’s communication world has created tremendous interest. Considering the importance of these services, the demand for applications using location-based services is also growing rapidly. While working with the applications of these services, there are many threats related to the issue of security. Security to the user’s data is to be provided from the unauthorized parties in the network. The main idea lies in preserving the privacy of the user using anonymization techniques. In this paper, a method for improving the location privacy of the user is proposed by the popular K-anonymity technique, and the implementation algorithm is also discussed.

Keywords

Location privacy Location-based services Location K-anonymity Cloaking Anonymizer 

References

  1. 1.
    El Emam K, Dankar FK (2008 Sept–Oct) Protecting privacy using k-anonymity. J Am Med Inf Assoc 15(5)Google Scholar
  2. 2.
    Pan X, Jianliang X, Meng X (2012) Protecting location privacy against location-dependent attacks in mobile services. J IEEE Trans Knowl Data Eng 24(8):1506–1519CrossRefGoogle Scholar
  3. 3.
    Tyagi AK, Sreenath N (2015 July) A comparative study on privacy preserving techniques for location based services. Br J Math Comput Sci 10(Issue 4):1–25. ISSN:2231-0851Google Scholar
  4. 4.
    Vu K, Zheng R, Gao J (2012) Efficient algorithms for K-anonymous location privacy in participatory sensing. In: Proceedings in IEEE INFOCOMGoogle Scholar
  5. 5.
    Wang D, Cheng H, Wang P (2016) On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst JGoogle Scholar
  6. 6.
    Kido H, Yanagisawa Y, Satoh T (2005 Apr 05–08) Protection of location privacy using dummies for location-based services. In: ICDEW’05, proceedings of the 21st international conference on data engineering workshops, 12–48Google Scholar
  7. 7.
    Zhang W, Song B, Bai E (2016) A trusted real time scheduling model for wireless sensor networks. J Sens 2016:1–19.  https://doi.org/10.1155/2016/8958170
  8. 8.
    Priya Iyer KB, Shanthi V (2013 May) Study on privacy aware location based service. J Sci Ind Res 72:294–299Google Scholar
  9. 9.
    Niu B, Li Q, Zhu X, Cao G, Li H (2014) Achieving k-anonymity in privacy-aware location-based services. Proc IEEE INFOCOM.  https://doi.org/10.1109/infocom.2014.6848002CrossRefGoogle Scholar
  10. 10.
    Wang Y, Xu D, He X, Zhang C, Li F, Xu B (2012) L2P2: location-aware location privacy protection for location-based services. In: Proceedings in IEEE INFOCOMGoogle Scholar
  11. 11.
    Song D, Park K (2016) A privacy-preserving location based system for continuous spatial queries. Mob Inf Syst 2016:1–8.  https://doi.org/10.1155/2016/6182769

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Lakshmi Prasanna Yeluri
    • 1
  • E. Madhusudhana Reddy
    • 2
  1. 1.Department of CSEJNTUHHyderabadIndia
  2. 2.Department of CSEGuruNanak Institutions Technical CampusHyderabadIndia

Personalised recommendations