STATE-OF-THE-ART, CHALLENGES: PRIVACY PROVISIONING IN TTP LOCATION BASED SERVICES SYSTEMS
Main Article Content
Abstract
Nowadays, Location-based services (LBS) System is commonly used by Mobile users worldwide due to the immense growth of the Internet and Mobile devices. A mobile user uses LBS to access services relevant to their locations. LBS usage raises severe privacy concerns. A secure LBS system is required to protect three fundamentals metrics such as temporal information, user identity, and spatial information. Different models are being used to deal with such privacy metrics such as TTP and NTTP. In current study, we have conducted a comprehensive survey on TTP privacy protecting techniques which are being used in LBS systems. Primarily, it would be facilitating the mobile users with full privacy when they interact with the LBS system. Moreover, it is aimed to provide a promising roadmap to research and development communities for right selection of privacy approach.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Hidetoshi Kido, Y. Y., & Satoh, T. (2005). Protection of Location Privacy using Dummies for Location-based Services. Proceedings of the 21st International Conference on Data Engineering (ICDE ’05).
Marius Wernke, P. S., & Frank Du¨rr, K. R. (n.d.). A Classiï¬cation of Location Privacy Attacks and Approaches. 1-24.
P. Golle and K. Partridge. On the anonymity of home/work location pairs. In H. Tokuda, M. Beigl, A. Friday, A. J. B. Brush, and Y. Tobe, editors, Pervasive computing, volume 5538 of Lecture Notes in Computer Science, pages 390–397. Springer, Berlin, 2009.
Chi-Yin Chow, M. F. (n.d.). Privacy in Location-based Services: A System Architecture Perspective. 23-27.
Neeta B. Bhongade, G. P. (2015). A Review of Privacy Preserving LBS: Study of Well-Suited Approaches. International Journal of Engineering Trends and Technology (IJETT), 62-65.
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st international conference on Mobile systems, applications and services (MobiSys ’03), New York, NY, USA, ACM (2003) 31–42.
Mokbel, M.F., Chow, C.Y., Aref, W.G: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd international conference on Very large data bases (VLDB ’06), VLDB Endowment (2006) 763–774.
Gedik, B., Liu, L: Location privacy in mobile systems: A personalized anonymization model. In: International Conference on Distributed Computing Systems (ICDCS 2005). (2005) 620–629.
Gedik, B., Liu, L: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7(1) (January 2008) 1–18.
Zhang, C., Huang, Y: Cloaking locations for anonymous location based services: a hybrid approach. Geoinformatica 13(2) (June 2009) 159–182
Bamba, B., Liu, L., Pesti, P., Wang, T: Supporting anonymous location queries in mobile environments with privacygrid. In: Proceeding of the 17th international conference on World Wide Web (WWW ’08), New York, NY, USA, ACM (2008) 237–246.
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: Proceedings of the IEEE 23rd International Conference on Data Engineering (ICDE 2007). (April 15–20, 2007) 106–115.
Solanas, A., Seb´e, F., Domingo-Ferrer, J.: Micro-aggregation-based heuristics for p sensitive k-anonymity: one step beyond. In: Proceedings of the 2008 international workshop on Privacy and anonymity in information society (PAIS ’08), New York, NY, USA, ACM (2008) 61–69
Mascetti, S., Bettini, C., Wang, X.S., Freni, D., Jajodia, S: Providenthider: An algorithm to preserve historical k-anonymity in lbs. In: IEEE International Conference on Mobile Data Management (MDM 2009). Volume 0, Los Alamitos, CA, USA, IEEE Computer Society (2009) 172–181. DOI 10.1109/MDM.2009.28
Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Proceedings of the International Conference on Pervasive Services (ICPS ’05). (July 11–14, 2005) 88–97.
Shankar, P, Ganapathy, V., Iftode, L.: Privately querying location-based services with sybilquery. In: International Conference on Ubiquitous Computing (UbiComp 2009). (2009) 31–40.
Beresford, A.R, Stajano, F: Mix zones: User privacy in location-aware services. In: PerCom Workshops. (2004) 127–131.
Palanisamy, B., Liu, L: Mobimix: Protecting location privacy with mix-zones over road networks. In: Proceedings of the 2011 IEEE 27th International Conference on Data Engineering. ICDE ’11, Washington, DC, USA, IEEE Computer Society (2011) 494–505.
Agusti Solanas, J. D.-F.-B. (n.d.). Location Privacy in Location-Based Services: Beyond TTP-based Schemes.
Mohamad Shady Alrahhal, A. A., & Muhammad Usman Ashraf, S.A. (17). AES-Route Server Model for Location based services in Road Network. (IJACSA) International Journal of Advanced Computer Science and Applications, 361-368. DOI: 10.12569/IJCSA.2007.080847.