ELRM: A Generic Framework for Location Privacy in LBS
Recent advances in mobile communication and development of sophisticated equipments lead to the wide spread use of Location Based Services (LBS). A major concern for large-scale deployment of LBSs is the potential abuse of their client location data, which may imply sensitive personal information. Protecting location information of the mobile user is challenging because a location itself may reveal user identity. Several schemes have been proposed for location cloaking. In our paper, we propose a generic Enhanced LBS Reference Model (ELRM), which describes the concept, the architecture and the functionalities for location privacy in LBS. As per the architecture, the system ensures location privacy, without trusting anybody including the peers or LBS servers. The system is fully distributed and evaluation shows its efficiency and high level of privacy with QoS.
KeywordsLocation privacy Location Based Services Location Cloaking Distributed Query Processing
Unable to display preview. Download preview PDF.
- 1.Al-Muhtadi, J., Campbell, R.H., Kapadia, A., Mickunas, M.D., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: Proc. of ICDCS 2002, pp. 74–83. IEEE Computer Society (2002)Google Scholar
- 2.Bettini, C., Mascetti, S., Wang, X.S.: Privacy protection through anonymity in location-based services. To appear in Handbook of Database Security: Applications and Trends. Springer (2007)Google Scholar
- 4.Yao, L., Lin, C., Kong, X., Xia, F., Wu, G.: A Clustering-based Location Privacy Protection Scheme for Pervasive Computing. In: IEEE/ACM International Conference on Green Computing and Communications & IEEE/ACM International Conference on Cyber, Physical and Social Computing (2010)Google Scholar
- 8.Hu, H., Xu, J., Senior Member, IEEE: 2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based ServicesGoogle Scholar
- 9.Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003: Proc. of the 1st Int. Conf. on Mobile Systems, Applications and Services, pp. 31–42 (2003)Google Scholar
- 10.Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: VLDB 2006: Proc. of the 32nd Int. Conf. on Very Large Data Bases, pp. 763–774 (2006)Google Scholar
- 13.Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: ICDCS 2005: Proc. of the 25th IEEE Int. Conf. on Distributed Computing Systems, pp. 620–629 (2005)Google Scholar
- 15.Khoshgozaran, A., Shahabi, C.: A taxonomy of approaches to preserve location privacy in location-based servicesGoogle Scholar
- 19.Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Proceedings of the International Conference on Pervasive Computing (2005)Google Scholar
- 20.Chow, C., Mokbel, M., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: GIS, pp. 171–178 (2006)Google Scholar
- 21.Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: WWW, pp. 371–380 (2007b)Google Scholar
- 22.Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: a mobile peer-to-peer system for anonymous location-based queries. In: SSTD, pp. 221–238 (2007c)Google Scholar