Advertisement

Produre: A Novel Proximity Discovery Mechanism in Location Tagging System

  • Jianbin Hu
  • Yonggang Wang
  • Tao Yang
  • Zhi Guan
  • Nike Gui
  • Zhong Chen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6694)

Abstract

Proximity discovery is a very interesting and useful technique which helps a user to find out his proximities who have the same or similar location with him during a certain period of time. However, current methods of discovering proximities are difficult to adopt and vulnerable when wrong location tags are provided. This paper proposes Produre, a novel proximity discovery mechanism in location tagging system based on users’ credibility degrees and online social network. The introduction of online social network helps to maintain the relationship and location exposure policies between friends. The users’ credibilities help to diminish the bad influence of malicious users who always annotate wrong location tags because the credibility scores change based on users’ performance. The experimental results by our prototype illustrate Produre can effectively discover proximities of a user in an efficient and accurate way with high quality and fewer mistakes.

Keywords

Proximity discovery location tagging system credibility degree online social network 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
  3. 3.
    Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location Privacy via Private Proximity Testing. In: NDSS (2011)Google Scholar
  4. 4.
  5. 5.
    Del.icio.us, http://del.icio.us/
  6. 6.
  7. 7.
  8. 8.
    Netease Bafang, http://bafang.163.com/
  9. 9.
    Šikšnys, L., Thomsen, J.R., Šaltenis, S., Yiu, M.L., Andersen, O.: A location privacy aware friend locator. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds.) SSTD 2009. LNCS, vol. 5644, pp. 405–410. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  10. 10.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003, pp. 31–42 (2003)Google Scholar
  11. 11.
    Golle, P., Partridge, K.: On the anonymity of home/Work location pairs. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 390–397. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  12. 12.
    Scott, L., Denning, D.E.: A location based encryption technique and some of its applications. Institute of Navigation National Technical Meeting, pp. 734–740 (2003)Google Scholar
  13. 13.
    Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM workshop on Wireless security (WiSe 2003), pp. 1–10 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Jianbin Hu
    • 1
  • Yonggang Wang
    • 1
  • Tao Yang
    • 1
  • Zhi Guan
    • 1
  • Nike Gui
    • 1
  • Zhong Chen
    • 1
  1. 1.Key Laboratory of High Confidence Software Technologies, Ministry of Education, China School of Electronics Engineering and Computer SciencePeking UniversityChina

Personalised recommendations