Supporting User Privacy in Location Based Services

نویسندگان

  • Anand S. Gajparia
  • Chris J. Mitchell
  • Chan Yeob Yeun
چکیده

To offer location based services, service providers need to have access to Location Information (LI) regarding the users which they wish to serve; this is a potential privacy threat. We propose the use of constraints, i.e. statements limiting the use and distribution of LI, that are securely bound to the LI, as a means to reduce this threat. Constraints may themselves reveal information to any potential LI user—that is, the constraints themselves may also be a privacy threat. To address this problem we introduce the notion of a LI Preference Authority (LIPA). A LIPA is a trusted party which can examine LI constraints and make decisions about LI distribution without revealing the constraints to the entity requesting the LI. This is achieved by encrypting both the LI and the constraints with a LIPA encryption key, ensuring that the LI is only revealed at the discretion of the LIPA. key words: multimedia location-based service, mobile security, privacy

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

A Review on Privacy Control Techniques in Context-aware Web Services

A context is being termed as " some information which can be utilized to identify the present condition of any entity " [1]. In a real time scenario, numerous examples related to the context are given such as location, time, temperature, noise, the bandwidth of communication, connectivity of network etc. " A system is considered to be context aware if it utilizes the context in an effort to pro...

متن کامل

Supporting privacy for U-Commerce tourism services

M-Commerce concerns delivering E-commerce services that take into account the mobility of the user. There are additional factors that are important for these kinds of E-commerce services such as Ubiquity (being available everywhere), Universality (being able to operate in heterogeneous environments), Uniqueness (relating services to a context such as the location) and working in Unison (allowin...

متن کامل

LocPriS: A Security and Privacy Preserving Location Based Services Development Framework

With the ever increasing pervasiveness of devices with functionality to provide location based services comes the increased importance and reliance upon those services to provide user privacy and security. Many techniques to facilitate privacy and security in mobile and fixed networks have been developed, but surveys of user’s show that this area still has a lot of work left to do to satisfy pr...

متن کامل

Enhancing Privacy in Mobile Collaborative Applications By Enabling End-User Tailoring Of The Distributed Architecture

Nowadays, supporting social interaction and multi-user requirements with mobile applications becomes indispensable. Thereby, security and privacy are of major concern due to the frequent scandals related to misusage of end-users data or various threats such as different kinds of man-in-the-middle attacks based on inferring interaction traces. Preserving the end-users’ privacy, especially in mob...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEICE Transactions

دوره 88-B  شماره 

صفحات  -

تاریخ انتشار 2005