The Location Information Preference Authority: Supporting user privacy in location-based services

نویسندگان

  • Anand S. Gajparia
  • Chris J. Mitchell
  • Chan Yeob Yeun
چکیده

To offer location-based services, service providers need to have access to Location Information (LI) regarding the users which they wish to serve; this is a potential privacy threat. Constraints, i.e. statements limiting the use and distribution of LI, that are securely bound to the LI, have been proposed as a means to reduce this threat. However, constraints may themselves reveal information to any potential LI user — that is, the constraints themselves may also be a privacy threat. To address this problem we introduce the notion of a LI Preference Authority (LIPA). A LIPA is a trusted party which can examine LI constraints and make decisions about LI distribution without revealing the constraints to the entity requesting the LI. This is achieved by encrypting both the LI and the constraints with a LIPA encryption key. This ensures that the LI is only revealed at the discretion of the LIPA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

Supporting User Privacy in Location Based Services

To offer location based services, service providers need to have access to Location Information (LI) regarding the users which they wish to serve; this is a potential privacy threat. We propose the use of constraints, i.e. statements limiting the use and distribution of LI, that are securely bound to the LI, as a means to reduce this threat. Constraints may themselves reveal information to any ...

متن کامل

Privacy Enhancements in the Mobile Internet

While the mobile Internet makes available location-based as well as other useful services to the mobile users, risks to the user’s privacy have to be taken into consideration. Personal user data, such as traffic data, location data, device and user specific capability and preference information, and content data is exposed at different sites, such as the WAP gateway/proxy or the origin server’s...

متن کامل

A Review on Privacy Control Techniques in Context-aware Web Services

A context is being termed as " some information which can be utilized to identify the present condition of any entity " [1]. In a real time scenario, numerous examples related to the context are given such as location, time, temperature, noise, the bandwidth of communication, connectivity of network etc. " A system is considered to be context aware if it utilizes the context in an effort to pro...

متن کامل

A Collaborative Approach to Enhance Security in Location Based Services by Answering Range Queries in WSN

We propose a privacy preserved location monitoring system using wireless sensor network. Here we are using two localized algorithms such as Resource aware algorithm and Quality aware algorithm. Our aim is to provide high quality privacy preserved Location Based Services for the user. If user is giving query , person will receive only aggregate location information based on K-anonymity value whi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004