A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services

نویسندگان

  • Oliver Jorns
  • Gerald Quirchmayr
  • Oliver Jung
چکیده

Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of networks and mobile devices but also because of novel location-based mobile applications which raise many expectations in the mobile market. As a result network operators start to offer their services to 3 party application providers which fosters the development of innovative applications. However, today mobile applications are forced to operate in the restricted environment of one network operator which is rather cumbersome for the development of novel location-based mobile applications that need to exchange location data between different network operators, over different countries. In this paper we discuss a system architecture aimed for location-based services that overcomes the aforementioned deficiencies. It uses transaction pseudonyms for the exchange of sensitive data by preserving users privacy and allows the development of novel applications that are operated by 3 party application providers accessing different network services. We show that the management of identities and pseudonyms allows even roaming users access to different kinds of location-based services.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services

We propose an identity management system that supports role-based pseudonyms that are bound to a given set of services (service contexts) and support the use of reputation systems. Our proposal offers a solution for the problem of providing privacy protection and reputation mechanisms concurrently. The trust information used to evaluate the reputation of users is dynamic and associated to their...

متن کامل

An Authorised Pseudonym System for Privacy Preserving Location Proof Architectures

An emerging class of Location Based Services (LBSs) needs verified mobile device locations for service provision. For example, an automated car park billing system requires verified locations of cars to confirm the place and the duration of parked cars. Location Proof Architectures (LPAs) allow a user (or a device on behalf of its user) to obtain a proof of its presence at a location from a tru...

متن کامل

A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms

Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. However, such functions can be easily misused for tracking users and building their activity profiles, if privacy enhancement mechanisms are not integrated into the service architecture. In this paper we present a protocol based on tr...

متن کامل

Anonymization in Proactive Location Based Community Services

Location information of mobile users is very sensitive with regard to privacy. This is especially true for proactive location based services (LBSs) where users are continuously tracked. Effective privacy enhancing technologies for these services are still an open field of research. In this paper, we focus on proactive location based community services (PLBCSs), such as mobile gaming or buddy tr...

متن کامل

Location-Preserved Contention Based Routing in VANETs

Location privacy protection in VANETs considers preserving two types of information: the locations and identifications of users. However, existing solutions which either replace identifications by pseudonyms or hide locations in areas cannot be directly applied to geographic routing protocols since they degrade network performance. To address this issue, we proposed a location-preserved content...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007