Rida Qayyum, Muhammad Usman Ashraf, Hina Ejaz


Nowadays, Location-based services (LBS) System is commonly used by Mobile users worldwide due to the immense growth of the Internet and Mobile devices. A mobile user uses LBS to access services relevant to their locations. LBS usage raises severe privacy concerns. A secure LBS system is required to protect three fundamentals metrics such as temporal information, user identity, and spatial information. Different models are being used to deal with such privacy metrics such as TTP and NTTP. In current study, we have conducted a comprehensive survey on TTP privacy protecting techniques which are being used in LBS systems. Primarily, it would be facilitating the mobile users with full privacy when they interact with the LBS system. Moreover, it is aimed to provide a promising roadmap to research and development communities for right selection of privacy approach.


Location-based services (LBS), Trusted Third Party (TTP), Privacy, Protection goals, k-anonymity, Mix Zone, Position Dummy

Full Text:



Hidetoshi Kido, Y. Y., & Satoh, T. (2005). Protection of Location Privacy using Dummies for Location-based Services. Proceedings of the 21st International Conference on Data Engineering (ICDE ’05).

Marius Wernke, P. S., & Frank Du¨rr, K. R. (n.d.). A Classification of Location Privacy Attacks and Approaches. 1-24.

P. Golle and K. Partridge. On the anonymity of home/work location pairs. In H. Tokuda, M. Beigl, A. Friday, A. J. B. Brush, and Y. Tobe, editors, Pervasive computing, volume 5538 of Lecture Notes in Computer Science, pages 390–397. Springer, Berlin, 2009.

Chi-Yin Chow, M. F. (n.d.). Privacy in Location-based Services: A System Architecture Perspective. 23-27.

Neeta B. Bhongade, G. P. (2015). A Review of Privacy Preserving LBS: Study of Well-Suited Approaches. International Journal of Engineering Trends and Technology (IJETT), 62-65.

Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on Mobile systems, applications and services (MobiSys ’03), New York, NY, USA, ACM (2003) 31–42.

Mokbel, M.F., Chow, C.Y., Aref, W.G: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on Very large data bases (VLDB ’06), VLDB Endowment (2006) 763–774.

Gedik, B., Liu, L: Location privacy in mobile systems: A personalized anonymization model. In: International Conference on Distributed Computing Systems (ICDCS 2005). (2005) 620–629.

Gedik, B., Liu, L: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7(1) (January 2008) 1–18.

Zhang, C., Huang, Y: Cloaking locations for anonymous location based services: a hybrid approach. Geoinformatica 13(2) (June 2009) 159–182

Bamba, B., Liu, L., Pesti, P., Wang, T: Supporting anonymous location queries in mobile environments with privacygrid. In: Proceeding of the 17th international conference on World Wide Web (WWW ’08), New York, NY, USA, ACM (2008) 237–246.

Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: Proceedings of the IEEE 23rd International Conference on Data Engineering (ICDE 2007). (April 15–20, 2007) 106–115.

Solanas, A., Seb´e, F., Domingo-Ferrer, J.: Micro-aggregation-based heuristics for p sensitive k-anonymity: one step beyond. In: Proceedings of the 2008 international workshop on Privacy and anonymity in information society (PAIS ’08), New York, NY, USA, ACM (2008) 61–69

Mascetti, S., Bettini, C., Wang, X.S., Freni, D., Jajodia, S: Providenthider: An algorithm to preserve historical k-anonymity in lbs. In: IEEE International Conference on Mobile Data Management (MDM 2009). Volume 0, Los Alamitos, CA, USA, IEEE Computer Society (2009) 172–181. DOI 10.1109/MDM.2009.28

Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Proceedings of the International Conference on Pervasive Services (ICPS ’05). (July 11–14, 2005) 88–97.

Shankar, P, Ganapathy, V., Iftode, L.: Privately querying location-based services with sybilquery. In: International Conference on Ubiquitous Computing (UbiComp 2009). (2009) 31–40.

Beresford, A.R, Stajano, F: Mix zones: User privacy in location-aware services. In: PerCom Workshops. (2004) 127–131.

Palanisamy, B., Liu, L: Mobimix: Protecting location privacy with mix-zones over road networks. In: Proceedings of the 2011 IEEE 27th International Conference on Data Engineering. ICDE ’11, Washington, DC, USA, IEEE Computer Society (2011) 494–505.

Agusti Solanas, J. D.-F.-B. (n.d.). Location Privacy in Location-Based Services: Beyond TTP-based Schemes.

Mohamad Shady Alrahhal, A. A., & Muhammad Usman Ashraf, S.A. (17). AES-Route Server Model for Location based services in Road Network. (IJACSA) International Journal of Advanced Computer Science and Applications, 361-368. DOI: 10.12569/IJCSA.2007.080847.



  • There are currently no refbacks.

Copyright (c) 2019 International Journal of Advanced Research in Computer Science