Produre: A Novel Proximity Discovery Mechanism in Location Tagging System
Proximity discovery is a very interesting and useful technique which helps a user to find out his proximities who have the same or similar location with him during a certain period of time. However, current methods of discovering proximities are difficult to adopt and vulnerable when wrong location tags are provided. This paper proposes Produre, a novel proximity discovery mechanism in location tagging system based on users’ credibility degrees and online social network. The introduction of online social network helps to maintain the relationship and location exposure policies between friends. The users’ credibilities help to diminish the bad influence of malicious users who always annotate wrong location tags because the credibility scores change based on users’ performance. The experimental results by our prototype illustrate Produre can effectively discover proximities of a user in an efficient and accurate way with high quality and fewer mistakes.
KeywordsProximity discovery location tagging system credibility degree online social network
Unable to display preview. Download preview PDF.
- 1.Facebook, http://www.facebook.com/
- 2.Renren, http://www.renren.com/
- 3.Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location Privacy via Private Proximity Testing. In: NDSS (2011)Google Scholar
- 4.Flickr, http://www.flickr.com/
- 5.Del.icio.us, http://del.icio.us/
- 6.YouTube, http://www.youtube.com/
- 7.Google, http://www.google.com/
- 8.Netease Bafang, http://bafang.163.com/
- 10.Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003, pp. 31–42 (2003)Google Scholar
- 12.Scott, L., Denning, D.E.: A location based encryption technique and some of its applications. Institute of Navigation National Technical Meeting, pp. 734–740 (2003)Google Scholar
- 13.Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM workshop on Wireless security (WiSe 2003), pp. 1–10 (2003)Google Scholar