Design and Analysis of Dkringa Protocol for Location Privacy in Trusted Environment
نویسندگان
چکیده
Originally K-anonymity principle was first used in relational databases to tackle the problem of data anonymity. In earlier protection techniques K threshold is used as personalization factor for mobile users. In case, K users are not present around needy client mobile user, query can be delayed and thus it will not help to achieve the Quality of service parameter. Moreover, authors have adopted methodology that if K-1 additional travelling users or queries are not seen by needy users, dummies are populated in the environment to improve the quality of service. Earlier architectures shows poor usage of K-principle, cryptography and cloaking space, which leads to threat during communication, more communication cost, more computation cost. We present here enhanced privacy model in a trustworthy third party privacy context that employs the notion of K-anonymity. In this work, enhanced algorithms are introduced, that guarantees a success of Location Based Services (LBS) query replies coming back to mobile client. Client sends the query to the anonymization server (AS), where this server cloaks the users with other at least K users. Our novelty in the experiment is that we have introduced cryptography from client to AS, modified earlier algorithms for Ring-Band approach, smart location updates and simulated the scaled experiment in populated cities environment. The AS add the dummies but creates ring-band cloaking area and sends it to LBS server. Cryptography adds some time however ring-band approach reduces communication overhead. We have studied the performance with variation of different parameters. The response from LBS comes to AS with Point of Interests (POIs) along the ring-band. After which AS filters for precise POIs and sends reply to mobile client. With ring-band approach we may also skip the AS and have client to LBS approach directly but without identity protection.
منابع مشابه
PE-TLBS: Secure Location Based Services Environment with Emphasis on Direct Anonymous Attestation Protocol
Nowadays, an IT officer would normally use virtualization as a security mechanism to provide clandestine isolation environment and concurrently hope with optimism to secure the emerging of cloud computing. Indeed, virtualization offers some kind of computing defense from being attacked from the cloud infrastructure. Significantly, the proliferation of Location Based Services in mobile and wirel...
متن کاملAn Approach for Location privacy in Pervasive Computing Environment
AbstractThis paper focus on location privacy in location based services, Location privacy is a particular type of information privacy that can be defined as the ability to prevent others from learning one’s current or past location. Many systems such as GPS implicitly and automatically give its users location privacy. Once user sends his or her current location to the application server, Applic...
متن کاملPrivacy-Preserving Location Assurance Protocols for Mobile Applications
Location-based applications require a user’s location data to provide customized services. However, location data is a sensitive piece of information that should not be revealed unless strictly necessary which induces the emerging of a number of location privacy protection methods, such as anonymity and obfuscation. However, in many applications, one needs to verify the authenticity and other p...
متن کاملA context-aware scheme for privacy-preserving location-based services
1389-1286/$ see front matter 2012 Elsevier B.V http://dx.doi.org/10.1016/j.comnet.2012.03.022 ⇑ Corresponding author. E-mail addresses: [email protected] (A. Pingle (W. Yu), [email protected] (N. Zhang), xinwenfu [email protected] (W. Zhao). We address issues related to privacy protection in location-based services (LBSs). Most existing privacy-preserving LBS techniques either require a trusted thi...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کامل