Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang

Privacy Preservation for Location-Based Services

  • Qingqi PeiEmail author
  • Lichuan Ma
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_178-1



The Location-Based Services (LBS) are information, alerts, or entertainment services that are provided to users according to their geographical and temporal information. Examples of LBS include location-based traffic reports, store finder, advertisements, and entertainments.

Historical Background

With the popularity of location-detection devices (e.g., handled devices equipped with GPS), their holders benefit a lot from LBS applications by receiving specific and useful information based on their location data. As a result, LBSs gain a dramatic development recently and various LBS applications have appeared. According to Shengling et al. (2018), LBSs can be classified into two categories, that is, elementary services and derivative services. Two typical examples of elementary services are navigation and search of Points of Interest (POIs). In navigation, positioning systems embedded in vehicles or handled devices can...

This is a preview of subscription content, log in to check access.


  1. Anh P, Italo D, Guillaume E, Juan T, Kevin H, Jean-Pierre H (2017) ORide: a privacy-preserving yet accountable ride-hailing service. In: The 26th USENIX security symposium, pp 1235–1252Google Scholar
  2. Aniket P, Nan Z, Xinwen F, Hyeong-Ah C, Suresh S, Wei Z (2011) Protection of query privacy for continuous location based services. In: IEEE conference on computer communications, pp 1710–1718Google Scholar
  3. Ben N, Qinghua L, Xiaoyan Z, Guohong C, L H (2014) Achieving k-anonymity in privacy-aware location-based services. In: IEEE conference on computer communications, pp 754–762Google Scholar
  4. Bugra G, Ling L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput 7:1–18CrossRefGoogle Scholar
  5. Chi-Yin C, Mohamed FM, Xuan L (2011) Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15:351–380CrossRefGoogle Scholar
  6. Haibo H, Jianliang X (2009) Non-exposure location anonymity. In: the 25th IEEE international conference on data engineering, pp 1120–1131Google Scholar
  7. Joseph M, Romit Roy C (2009) Hiding stars with fireworks: location privacy through camouflage. In: the 15th ACM annual international conference on mobile computing and networking, pp 345–356Google Scholar
  8. Lichuan M, Xuefeng L, Qingqi P, Yong X (2018) Privacy-preserving reputation management for edge computing enhanced mobile crowdsensing. IEEE Trans Serv Comput, Early Access, 1–14. https://doi.org/10.1109/TSC.2018.2825986
  9. Miguel E A, Nicolas E B, Konstantinos C, Catuscia P (2013) Geo-indistinguishability: differential privacy for location-based systems. In: ACM SIGSAC conference on computer and communications security, pp 901–914Google Scholar
  10. Roman S, Chi-Yin C, Qiong H, Duncan SW (2015) User-defined privacy grid system for continuous location-based services. IEEE Trans Mob Comp 14:2158–2172CrossRefGoogle Scholar
  11. Russell P, Md Golam K, Xun Y, Elisa B (2013) Privacy-preserving and content-protecting location based queries. IEEE Trans Knowl Data Eng 26:1200–1210Google Scholar
  12. Shengling W, Qin H, Yunchuan S, Jianhui H (2018) Privacy preservation in location-based services. IEEE Commun Mag 56:134–140Google Scholar
  13. Wai Kit W, David Wai-lok C, Ben K, Nikos M (2009) Secure kNN computation on encrypted databases. In: ACM SIGMOD international conference on management of data, pp 139–152Google Scholar
  14. Zi L, Qingqi P, Ian M, Yao L, Haojin Z (2017) Secret key establishment via RSS trajectory matching between wearable devices. IEEE Trans Inf Forensic Secur 13:802–817Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Xidian UniversityXi’anChina

Section editors and affiliations

  • Haojin Zhu
    • 1
  • Jian Shen
    • 2
  1. 1.Shanghai Jiaotong University, ChinaShanghaiChina
  2. 2.Nanjing University of Information Science & Technology, ChinaNanjingChina