DOI QR코드

DOI QR Code

Ensuring Anonymity for LBSs in Smartphone Environment

  • Received : 2010.08.06
  • Accepted : 2010.08.31
  • Published : 2011.03.31

Abstract

With the rapid growth of GPS-enable Smartphones, the interest on using Location Based Services (LBSs) has increased significantly. The evolution in the functionalities provided by those smartphones has enabled them to accurately pinpoint the location of a user. Because location information is what all LBSs depend on to process user's request, it should be properly protected from attackers or malicious service providers (SP). Additionally, maintaining user's privacy and confidentiality are imperative challenges to be overcome. A possible solution for these challenges is to provide user anonymity, which means to ensure that a user initiating a request to the SP should be indistinguishable from a group of people by any adversary who had access to the request. Most of the proposals that maintain user's anonymity are based on location obfuscation. It mainly focuses on adjusting the resolution of the user's location information. In this paper, we present a new protocol that is focused on using cryptographic techniques to provide anonymity for LBSs users in the smartphone environment. This protocol makes use of a trusted third party called the Anonymity Server (AS) that ensures anonymous communication between the user and the service provider.

Keywords

References

  1. N. Poolsappasit and I. Ray, “Towards Achieving Personalized Privacy for Location-Based Services,” Proceedings of Transactions on Data Privacy 2, Catalonia, Spain, 2009 April, pp.77-99.
  2. L.F. Cranor and B.A. LaMacchia, “Spam!,” Communications of the ACM, Vol.41, No.8, 1998, pp.74-83. https://doi.org/10.1145/280324.280336
  3. A.S. Gajparia, C.J. Mitchell and C.Y. Yeun, “Supporting User Privacy in Location Based Services,” Proceedings of Mobile Multimedia Communications on IEICE Transactions on Communications, 2005 July, pp.2837-2847.
  4. D.M. Konidala, C.Y. Yeun and K.J. Kim, “A Secure and Privacy Enhanced Protocol for Locationbased Services in Ubiquitous Society,” Proceedings of IEEE Global Telecommunications Conference 2004, Dallas, Texas, USA, 2004 November, pp.2164-2168.
  5. M. Gruteser and D. Grunwald, “Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking,” Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (MobiSys '03), San Francisco, CA, USA, 2003 May, pp.31-42.
  6. C. Bettini, X.S. Wang, S. Jajodia, “Protecting privacy against location-based personal identification,” Proceedings of the 2nd VLDB Workshop on Secure Data Management (SDM'05), Trondheim, Norway, 2005 September, pp.185-199.
  7. M. Gheorghita, A. Solanas and J. Forne, “Location Privacy in Chain-Based protocols for Location-Based services,” Proceedings of Third International Conference on Digital Telecommunications, Bucharest, Romania, 2008 June, pp.64-69.
  8. C. Bettini, S. Mascetti, X.S. Wang, and S. Jajodia, “Anonymity in Location-Based Services: Towards a General Framework,” Proceedings of the International Conference on Mobile Data Management, Mannheim, Germany, 2007 May, pp.69-76.
  9. C. Bettini, L. Pareschi, S. Jajodia. “Anonymity and diversity in LBS: a preliminary investigation,” Proceedings of Fifth IEEE International Conference on Pervasive Computing and Communications (PERCOM-07), DC, USA, 2007 April, pp.577-580.
  10. D. Chaum, “Untraceable Electronic, Mail Return Addresses, and Digital Pseudonyms”, Communication of the ACM, Vol.24, No.2, 1981, pp.84-90. https://doi.org/10.1145/358549.358563
  11. A.Y.Lindell, Anonymous Authentication [online database], http://www.aladdin.com/blog/pdf/AnonymousAuthentication.pdf.
  12. A.S. Gajparia, C.Y. Yeun and C. Mitchell, “Using constraints to protect personal location information”, Proceedings of the 58th IEEE Semi-annual VTC 2003-Fall, Orlando, Florida, USA, 2003 October, pp.2112-2116.
  13. B. Gedik , L. Liu, “Location Privacy in Mobile Systems: A Personalized Anonymization Model,” Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus, Ohio, USA, 2005 June,pp.620-629.
  14. P. Kalnis, G. Ghinita, K. Mouratidis and D. Papadias, “Preventing Location-Based Identity Inference in Anonymous Spatial Queries”, IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), Vol.19, No.12, 2007, pp.1719-1733. https://doi.org/10.1109/TKDE.2007.190662
  15. L. Sweeney, “k-anonymity: a model for protecting privacy”, International Journal on Uncertainty Fuzziness and Knowledge-based Systems, Vol.10, No.5, 2002, pp.557-570. https://doi.org/10.1142/S0218488502001648
  16. H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services”, Proceedings of the International Conference on Pervasive Services (ICPS), Santorini, Greece, 2005 July, pp.88-97.
  17. J. I. Hong and J. A. Landay, “An architecture for privacy-sensitive ubiquitous computing”, Proceedings of the International Conference on Mobile Systems (MOBISYS), New York, NY, USA, 2004, pp.177-189.
  18. G. Ghinita, P. Kalnis, and S. Skiadopoulos, "Priv'e: Anonymous location-based queries in distributed mobile systems", Proceedings of the International World Wide Web conference, Banff, Canada, 2007 May, pages 476-485.
  19. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. L. Tan, “Private queries in location based services: Anonymizers are not necessary”, Proceedings of the International conference on Management of data (SIGMOD), Vancouver, BC, Canada, 2008 June, pp.121-132.
  20. G. Ghinita, P. Kalnis, and S. Skiadopoulos, “Mobihide : A mobile peer-to-peer system for anonymous location-based queries”, Proceedings of the Symposium on Spatial and Temporal Databases (SSTD), Boston, MA, 2007 July, pp.221-238.

Cited by

  1. Multiple 3D object position estimation and tracking using double filtering on multi-core processor vol.63, pp.1, 2013, https://doi.org/10.1007/s11042-012-1029-9
  2. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications vol.2017, 2017, https://doi.org/10.1155/2017/3606424
  3. A prediction and auto-execution system of smartphone application services based on user context-awareness vol.60, pp.8, 2014, https://doi.org/10.1016/j.sysarc.2014.04.001
  4. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage vol.39, pp.1, 2013, https://doi.org/10.1016/j.compeleceng.2012.11.002