Taxonomy of Dummy Generation Techniques for Preserving Location Privacy

نویسنده

  • Ranjan Kumar
چکیده

With the advent of GIS, Internet and mobile telephony, Location based services are becoming the need of the day. Privacy issues arising while using location based services have the potential to become the serious apprehensions. Existing privacy techniques based on anonymity generally fails in to offer the required privacy. We are focusing on the dummy generation techniques available in literature to protect location privacy. In these techniques, the actual location of a user along with several false position data (dummies) sent to the service provider. Because the service provider cannot distinguish the true position data, the user’s location privacy is protected. All the available algorithms to generate dummies (for query, locations as well as for trajectories) are reviewed. We briefly discussed and compared all the dummy generation techniques and listed the details of each technique.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Long-term location privacy protection for location-based services in mobile cloud computing

The popularity of mobile devices, especially intelligent mobile phones, significantly prompt various location-based services (LBSs) in cloud systems. These services not only greatly facilitate people’s daily lives, but also cause serious threats that users’ location information may be misused or leaked by service providers. The dummy-based privacy protection techniques have significant advantag...

متن کامل

Efficient location privacy algorithm for Internet of Things (IoT) services and applications

Location-based Services (LBS) have become a very important area for research with the rapid development of Internet of Things (IoT) technology and the ubiquitous use of smartphones and social networks in our daily lives. Although users can enjoy a lot of flexibility and conveniences from the LBS with IoT, they may also lose their privacy. Untrusted or malicious LBS servers with all users’ infor...

متن کامل

Privacy-preserving nearest neighbor queries using geographical features of cellular networks

Although location-based services (LBSes), such as nearest neighbor query, have become popular, privacy remains a challenging issue for users. Many privacy preserving techniques have been proposed, but their complexity, insufficiency, and time consumption make them unattractive to users, who prefer accuracy and quickness. To address this limitation, we introduce a framework to protect user priva...

متن کامل

Semantics-aware Obfuscation for Location Privacy

The increasing availability of personal location data pushed by the widespread use of location-sensing technologies raises a great concern for the safeguard of location privacy for which location privacy-preserving techniques are being investigated. Location privacy is an important requirements of location-based services (LBS). Typically privacy-preserving techniques in LBS are based on the ide...

متن کامل

A new 'Direction' for source location privacy in wireless sensor networks'

Preserving source location privacy in wireless sensor networks can be critical for several practical applications. Existing solutions proposed specifically for sensor networks rely on a combination of dynamic routing and dummy traffic to hide real event messages. While some privacy protection guarantees can be given, these solutions also tend to be expensive due to fake transmissions and non-sh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013