Modeling and Performance Comparison of Privacy Approaches for Location Based Services
نویسندگان
چکیده
In pervasive computing environment, Location Based Services (LBSs) are getting popularity among users because of their usefulness in day-to-day life. LBSs are information services that use geospatial data of mobile device and smart phone users to provide information, entertainment and security in real time. A key concern in such pervasive computing environment is the need to reveal the user’s exact location which may allow an adversary to infer private information about the user. To address the privacy concerns of LBS users, a large number of security approaches have been proposed based on the concept of k -anonymity. The central idea in location k anonymity is to find a set of k-1 users confined in a given geographical area of the actual user, such that the location of these k users are indistinguishable from one another, thus protecting the identity of the user. Although a number of performance parameters like success rate, amount of privacy achieved are used to measure the performance of the k -anonymity approaches, they make the implicit, unrealistic assumption that the k-1 users are readily available. As such these approaches ignore the turnaround time to process a user request, which is crucial for a real-time application like LBS. In this work, we model the k -anonymity approaches using queuing theory to compute the average sojourn time of users and queue length of the system. To demonstrate that queuing theory can be used to model all k -anonymity approaches, we consider graph-based k -anonymity approaches. The proposed analytical model is further validated with experimental results.
منابع مشابه
improvement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملScenario-based modeling for multiple allocation hub location problem under disruption risk: multiple cuts Benders decomposition approach
The hub location problem arises in a variety of domains such as transportation and telecommunication systems. In many real-world situations, hub facilities are subject to disruption. This paper deals with the multiple allocation hub location problem in the presence of facilities failure. To model the problem, a two-stage stochastic formulation is developed. In the proposed model, the number of ...
متن کاملOn modeling door-to-door parcel delivery services in Iran
Parcel delivery is a complex logistic service, as it serves many small or medium-sized customers who may send or receive parcels. Modeling such delivery system needs to integrate two different research areas of hub location and vehicle routing. As it totally depends on the network and the linkage of the nodes, in this paper, some door-to-door service providers are taken into account to provide ...
متن کاملExamining Location-based Services Usage from the Perspectives of Unified Theory of Acceptance and Use of Technology and Privacy Risk
As an emerging service, location-based services (LBS) have not received wide adoption among users. Drawing on both perspectives of Unified Theory of Acceptance and Use of Technology (UTAUT) and privacy risk, this research examined user adoption of LBS. We conducted data analysis with structural equation modeling. The results indicated that usage intention is affected by both enablers such as pe...
متن کاملA taxonomy of approaches to preserve location privacy in location-based services
The ubiquity of smartphones and other location-aware hand-held devices has resulted in a dramatic increase in popularity of location-based services (LBS) tailored to users’ locations. The comfort of LBS comes with a privacy cost. Various distressing privacy violations caused by sharing sensitive location information with potentially malicious services have highlighted the importance of location...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1711.04974 شماره
صفحات -
تاریخ انتشار 2017