• Title/Summary/Keyword: Location-Privacy

Search Result 262, Processing Time 0.037 seconds

Enabling Route Optimization for Large Networks with Location Privacy Consideration

  • Thanh Vu Truong;Yokota Hidetoshi;Urano Yoshiyori
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.42-46
    • /
    • 2004
  • Mobile IP [9] was introduced to help the mobile user to be contacted with a single IP address even though the point-of-access changes. However, mobile IP creates the so-called 'triangle routing' which makes the delays for data packets longer, as well as creating unnecessary traffic at the home network of the mobile user. To overcome this, Route Optimization (RO) for mobile IP [1] was proposed, which eliminated the triangle routing phenomenon. But [l] requires that the network protocol stack of all existing hosts to change. Privacy is also another matter to be considered. This paper introduces a scheme called Peer Agent scheme to implement RO for mobile IP without requiring existing hosts to change. Method to preserve location privacy while still enabling RO is also considered.

  • PDF

Efficient Dummy Generation for Protecting Location Privacy (개인의 위치를 보호하기 위한 효율적인 더미 생성)

  • Cai, Tian-Yuan;Song, Doo-Hee;Youn, Ji-Hye;Lee, Won-Gyu;Kim, Yong-Kab;Park, Kwang-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.526-533
    • /
    • 2016
  • The researches protecting user's location in location-based services(LBS) have received much attention. Especially k-anonymity is the most popular privacy preservation method. k-anonymization means that it selects k-1 other dummies or clients to make the cloaking region. This reduced the probability of the query issuer's location being exposed to untrusted parties to 1/k. But query's location may expose to adversary when k-1 dummies are concentrated in query's location or there is dummy in where query can not exist. Therefore, we proposed the dummy system model and algorithm taking the real environment into account to protect user's location privacy. And we proved the efficiency of our method in terms of experiment result.

Location Privacy Enhanced Routing for Sensor Networks in the Presence of Dormant Sources (휴면 소오스들이 존재하는 환경의 센서 네트워크를 위한 위치 보호 강화 라우팅)

  • Yang, Gi-Won;Lim, Hwa-Jung;Tscha, Yeong-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.12-23
    • /
    • 2009
  • Sensor networks deployed in battlefields to support military operations or deployed in natural habitats to monitor the rare wildlifes must take account of protection of the location of valuable assets(i.e., soldiers or wildlifes) from an adversary or malicious tracing as well as the security of messages in transit. In this paper we propose a routing protocol GSLP(GPSR-based Source-Location Privacy) that is capable of enhancing the location privacy of an active source node(i.e., message-originating node) in the presence of multiple dormant sources(i.e., nodes lying nearby an asset whose location needs to be secured). Extended is a simple, yet scalable, routing scheme GPSR(greedy perimeter stateless routing) to select randomly a next-hop node with a certain probability for randomizing paths and to perform perimeter routing for detouring dormant sources so that the privacy strength of the active source, defined as safety period, keeps enhanced. The simulation results obtained by increasing the number of dormant sources up to 1.0% of the total number of nodes show that GSLP yields increased and nearly invariant safety periods, while those of PR-SP(Phantom Routing, Single Path), a notable existing protocol for source-location privacy, rapidly drop off as the number of dormant sources increases. It turns out that delivery latencies of GSLP are roughly less than two-fold of the shortest path length between the active source and the destination.

The Effect of Characteristics and Perceived Privacy Risk of Mobile Location-based SNS on Intention to Use SoLoMo Applications (모바일 위치기반 SNS의 특성과 지각된 프라이버시 위험이 SoLoMo 어플리케이션의 이용의도에 미치는 영향)

  • Shin, Taeksoo;Cho, Won Sang
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.205-230
    • /
    • 2014
  • In recent years, the social network service (SNS) and the location-based social network service (LBSNS) industry is expanding and the competition within the field is increasing much more. Since 2010, the full-scaled studies of SNS and LBSNS have begun. With the growth of SNS and LBSNS markets, SoLoMo (Social-Local-Mobile) is also becoming the trend for applications in different fields. However, despite the importance of SoLoMo, there have been little studies on the characteristics of SoLoMo applications. The purpose of this research is to investigate the effect of characteristics and perceived privacy risk of mobile location-based SNS on intention to use SoLoMo applications. For the purpose, we proposed a SoLoMo service acceptance model with TAM (Technology Acceptance Model) and the characteristics of SoLoMo applications. The characteristics consist of three factors, i.e. SNS, location, and mobile-related factors. This study also considered a gamification and a perceived privacy risk factor influencing on SoLoMo service usage in our proposed research model. The results of our empirical analysis using partial least squares (PLS) method show that the characteristics of SoLoMo applications including SNS, location, and mobile-related features, gamification, and perceived privacy risk have partially an effect on intention to use SoLoMo applications. Based on these results, SoLoMo-related companies will be able to increase the usage of SoLoMo services by differentiating their own strategies with these factors influencing on SoLoMo services.

An Analysis of the Regulation Limits for Location Based Services (위치기반서비스의 법률적 규제범위 분석)

  • Jin, Heui-Chae;Sun, Yo-Sub;Nam, Kwang-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.177-182
    • /
    • 2009
  • Location Based Service(LBS) is various and widely spreading service based on the Location information. Those services are under the control of Privacy Act for Location Information to protect from misusing or overusing of personal location information. In this paper, we analyze a concept and a feature of personal location information and how to use and control the flow of location information by the Location Information Act. As the result of this paper, we expect to use the location information in various fields to develop more efficient service.

  • PDF

Privacy Protection Model for Location-Based Services

  • Ni, Lihao;Liu, Yanshen;Liu, Yi
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.96-112
    • /
    • 2020
  • Solving the disclosure problem of sensitive information with the k-nearest neighbor query, location dummy technique, or interfering data in location-based services (LBSs) is a new research topic. Although they reduced security threats, previous studies will be ineffective in the case of sparse users or K-successive privacy, and additional calculations will deteriorate the performance of LBS application systems. Therefore, a model is proposed herein, which is based on geohash-encoding technology instead of latitude and longitude, memcached server cluster, encryption and decryption, and authentication. Simulation results based on PHP and MySQL show that the model offers approximately 10× speedup over the conventional approach. Two problems are solved using the model: sensitive information in LBS application is not disclosed, and the relationship between an individual and a track is not leaked.

RFID Authentication Protocol with Strong Resistance against Traceability and Denial of Service attack (위치 추적과 서비스 거부 공격에 강한 RFID 인증 프로토콜)

  • Kang, Jeon-Il;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.71-82
    • /
    • 2005
  • Though there are many authentication protocols for RFID system, only a few protocols support location privacy. Because of tag's hardware limitation, these protocols suffer from many security threats, especially from DoS (Denial of Service) attack. In this paper, we explain location privacy problem and show vulnerabilities of RFID authentication protocols. And then, we suggest an authentication protocol that is strong against location tracing, spoofing attack and DoS attack

An Investigation of a Role of Affective factors in Users' Coping with Privacy Risk from Location-based Services (위치기반 서비스(Location-based Service)의 프라이버시 위험 대응에 있어 사용자 감정(Affect)의 역할)

  • Park, Jonghwa;Jung, Yoonhyuk
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.201-213
    • /
    • 2020
  • Despite empirical research that the response to human risk is significantly influenced affective factors, the role of affective factors has been unexplored in information privacy research. This study aims to explore the privacy behaviors of location-based service (LBS) users from an affective point of view. Specifically, the study explored the relationship between three types of privacy threats (collection, hacking, secondary use), two affects (worry, anger), and a coping behavior (continuous use intentions). The structured survey was conducted with 552 users. In order to analyze the effect of the combination of perception of particular privacy threats and particular affects on the intention of continuous use, association rules, one of the data mining techniques, was employed. As a result, there was a difference in the intention to use according to the combination of the perception of risk and affect responses, and the most significant influence on the intention is when the second use of personal information was combined with anger. This study has significant theoretical contribution in that it includes affective factors in the research of information privacy users, complementing the biases of existing cognition-oriented approaches and providing a comprehensive understanding of privacy response behavior.

Security Enhanced Authentication Protocol in LTE With Preserving User Location Privacy (LTE에서 사용자 위치 정보 보호를 위한 보안 향상 인증 프로토콜)

  • Hahn, Changhee;Kwon, Hyunsoo;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.41 no.9
    • /
    • pp.715-727
    • /
    • 2014
  • The number of subscribers in 4th generation mobile system has been increased rapidly. Along with that, preserving subscribers' privacy has become a hot issue. To prevent users' location from being revealed publicly is important more than ever. In this paper, we first show that the privacy-related problem exists in user authentication procedure in 4th generation mobile system, especially LTE. Then, we suggest an attack model which allows an adversary to trace a user, i.e. he has an ability to determine whether the user is in his observation area. Such collecting subscribers' location by an unauthorized third party may yield severe privacy problem. To keep users' privacy intact, we propose a modified authentication protocol in LTE. Our scheme has low computational overhead and strong secrecy so that both the security and efficiency are achieved. Finally, we prove that our scheme is secure by using the automatic verification tool ProVerif.

An Algorithm for generating Cloaking Region Using Grids for Privacy Protection in Location-Based Services (위치기반 서비스에서 개인 정보 보호를 위한 그리드를 이용한 Cloaking 영역 생성 알고리즘)

  • Um, Jung-Ho;Kim, Ji-Hee;Chang, Jae-Woo
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.151-161
    • /
    • 2009
  • In Location-Based Services (LBSs), users requesting a location-based query send their exact location to a database server and thus the location information of the users can be misused by adversaries. Therefore, a privacy protection method is required for using LBS in a safe way. In this paper, we propose a new cloaking region generation algorithm using grids for privacy protection in LBSs. The proposed algorithm creates a m inimum cloaking region by finding L buildings and then performs K-anonymity to search K users. For this, we make use of not only a grid-based index structure, but also an efficient pruning techniques. Finally, we show from a performance analysis that our cloaking region generation algorithm outperforms the existing algorithm in term of the size of cloaking region.

  • PDF