ELRM: A Generic Framework for Location Privacy in LBS

  • Muhamed Ilyas
  • R. Vijayakumar
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (volume 167)


Recent advances in mobile communication and development of sophisticated equipments lead to the wide spread use of Location Based Services (LBS). A major concern for large-scale deployment of LBSs is the potential abuse of their client location data, which may imply sensitive personal information. Protecting location information of the mobile user is challenging because a location itself may reveal user identity. Several schemes have been proposed for location cloaking. In our paper, we propose a generic Enhanced LBS Reference Model (ELRM), which describes the concept, the architecture and the functionalities for location privacy in LBS. As per the architecture, the system ensures location privacy, without trusting anybody including the peers or LBS servers. The system is fully distributed and evaluation shows its efficiency and high level of privacy with QoS.


Location privacy Location Based Services Location Cloaking Distributed Query Processing 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Al-Muhtadi, J., Campbell, R.H., Kapadia, A., Mickunas, M.D., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: Proc. of ICDCS 2002, pp. 74–83. IEEE Computer Society (2002)Google Scholar
  2. 2.
    Bettini, C., Mascetti, S., Wang, X.S.: Privacy protection through anonymity in location-based services. To appear in Handbook of Database Security: Applications and Trends. Springer (2007)Google Scholar
  3. 3.
    Sun, Y., La Porta, T.F., Kermani, P.: A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice. IEEE Transactions on Mobile Computing 8(3), 304–321 (2009)CrossRefGoogle Scholar
  4. 4.
    Yao, L., Lin, C., Kong, X., Xia, F., Wu, G.: A Clustering-based Location Privacy Protection Scheme for Pervasive Computing. In: IEEE/ACM International Conference on Green Computing and Communications & IEEE/ACM International Conference on Cyber, Physical and Social Computing (2010)Google Scholar
  5. 5.
    Hashem, T., Kulik, L.: Don’t trust anyone”: Privacy protection for location-based services. Pervasive and Mobile Computing 7, 44–59 (2011)CrossRefGoogle Scholar
  6. 6.
    Gandon, F.L., Sadeh, N.M.: A Semantic E-Wallet to Reconcile Privacy and Context Awareness. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 385–401. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Wishart, R., Henricksen, K., Indulska, J.: Context Obfuscation for Privacy via Ontological Descriptions. In: Strang, T., Linnhoff-Popien, C. (eds.) LoCA 2005. LNCS, vol. 3479, pp. 276–288. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Hu, H., Xu, J., Senior Member, IEEE: 2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based ServicesGoogle Scholar
  9. 9.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003: Proc. of the 1st Int. Conf. on Mobile Systems, Applications and Services, pp. 31–42 (2003)Google Scholar
  10. 10.
    Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: VLDB 2006: Proc. of the 32nd Int. Conf. on Very Large Data Bases, pp. 763–774 (2006)Google Scholar
  11. 11.
    Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Transactions on Mobile Computing 7(1), 1–18 (2008)CrossRefGoogle Scholar
  12. 12.
    Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering 19(12), 1719–1733 (2007)CrossRefGoogle Scholar
  13. 13.
    Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: ICDCS 2005: Proc. of the 25th IEEE Int. Conf. on Distributed Computing Systems, pp. 620–629 (2005)Google Scholar
  14. 14.
    Bettini, C., Wang, X., Jajodia, S.: Protecting Privacy Against Location-Based Personal Identification. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol. 3674, pp. 185–199. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  15. 15.
    Khoshgozaran, A., Shahabi, C.: A taxonomy of approaches to preserve location privacy in location-based servicesGoogle Scholar
  16. 16.
    Samarati, P.: Protecting respondents’ identities in microdata release. IEEE Trans. Knowl Data Engin. 13(6), 1010–1027 (2001)CrossRefGoogle Scholar
  17. 17.
    Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Inter. J. Uncert. Fuzz. Knowl.-Based Syst. 10(5), 571–588 (2002a)MathSciNetMATHCrossRefGoogle Scholar
  18. 18.
    Sweeney, L.: k-anonymity: A model for protecting privacy. Inter. J. Uncert. Fuzz. Knowl.-Based Syst. 10(5), 557–570 (2002b)MathSciNetMATHCrossRefGoogle Scholar
  19. 19.
    Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Proceedings of the International Conference on Pervasive Computing (2005)Google Scholar
  20. 20.
    Chow, C., Mokbel, M., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: GIS, pp. 171–178 (2006)Google Scholar
  21. 21.
    Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: WWW, pp. 371–380 (2007b)Google Scholar
  22. 22.
    Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: a mobile peer-to-peer system for anonymous location-based queries. In: SSTD, pp. 221–238 (2007c)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.School of Computer ScienceMahatma Gandhi UniversityKottayamIndia

Personalised recommendations