Location Privacy And Geo Based Applications

Yadlapalli S S Lakshmi Ramani, D Ramesh

Abstract


— Using Geo-social networking like Apple's i Groups and Hot Potato, many people communicate with their neighbouring locations through their associates and their suggestions. Without sufficient location protection, however, these systems can be easily misused, in this paper, we introduce, a technique that provides location secrecy without adding complexity into query results. Our idea here is to secure user-specific, coordinate conversion to all location data shared with the server. The associates of a user share this user’s secret key so they can apply the same conversion. This allows all spatial queries to be evaluated correctly by the server, but our privacy mechanisms guarantee that servers are unable to see or infer the actual location data from the transformed data or from the data access.


Keywords


Location privacy, security, location-based social applications, location transformation, efficiency

References


M. Motani, V. Srinivasan, and P. S. Nuggehalli, “Peoplenet: engineering a wireless virtual social network,” in Proc. of MobiCom, 2005.

M. Hendrickson, “The state of location-based social networking,” 2008.

P. Mohan, V. N. Padmanabhan, and R. Ramjee, “Nericell: rich monitoring of road and traffic conditions using mobile smartphones,” in Proc. of SenSys, 2008.

G. Ananthanarayanan, V. N. Padmanabhan, L. Ravindranath, and C A. Thekkath, “Combine: leveraging the power of wireless peers through collaborative downloading,” in Proc. of MobiSys, 2007.

M. Siegler, “Foodspotting is a location-based game that will make your mouth water,” http://techcrunch.com/2010/03/04/foodspotting/.

http://www.scvngr.com.

B. Schilit, J. Hong, and M. Gruteser, “Wireless location privacy protection,”Computer, vol. 36, no. 12, pp. 135–137, 2003.

F. Grace, “Stalker Victims Should Check For GPS,” Feb. 2003,www.cbsnews.com.

DailyNews, “How cell phone helped cops nail key murder suspect secret’pings’ that gave bouncer away,” Mar. 2006.

“Police: Thieves robbed homes based on facebook, social media

sites,” WMUR News, September 2010,

http://www.wmur.com/r/24943582/detail.html.

M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proc. of Mobisys, 2003.

M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: A privacyaware location-based database server,” in ICDE, 2007.

B. Gedik and L. Liu, “Location privacy in mobile systems: A personalized anonymization model,” in Proc. of ICDCS, 2005.

T. Jiang, H. J. Wang, and Y.-C. Hu, “Preserving location privacy in wireless lans,” in Proc. of MobiSys, 2007.

P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” TKDE, 2007.

G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, “Private queries in location based services: anonymizers are not necessary,” in SIGMOD Conference, 2008.

S. Papadopoulos, S. Bakiras, and D. Papadias, “Nearest neighbour search with strong location privacy,” PVLDB, 2010.

A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh, “Location privacy via private proximity testing,” in Proc. Of NDSS, 2011.

G. Zhong, I. Goldberg, and U. Hengartner, “Louis, lester and pierre:Three protocols for location privacy,” in Proc. of PET, 2007.

N. Daswani and D. Boneh, “Experimenting with electronic commerceon the palmpilot,” in Financial Cryptography. Springer, 1999.

A. Khoshgozaran and C. Shahabi, “Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy,” in Proc.of SSTD, 2007.


Full Text: PDF [FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.