The Location Information Preference Authority: Supporting user privacy in location-based services
نویسندگان
چکیده
To offer location-based services, service providers need to have access to Location Information (LI) regarding the users which they wish to serve; this is a potential privacy threat. Constraints, i.e. statements limiting the use and distribution of LI, that are securely bound to the LI, have been proposed as a means to reduce this threat. However, constraints may themselves reveal information to any potential LI user — that is, the constraints themselves may also be a privacy threat. To address this problem we introduce the notion of a LI Preference Authority (LIPA). A LIPA is a trusted party which can examine LI constraints and make decisions about LI distribution without revealing the constraints to the entity requesting the LI. This is achieved by encrypting both the LI and the constraints with a LIPA encryption key. This ensures that the LI is only revealed at the discretion of the LIPA.
منابع مشابه
improvement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملSupporting User Privacy in Location Based Services
To offer location based services, service providers need to have access to Location Information (LI) regarding the users which they wish to serve; this is a potential privacy threat. We propose the use of constraints, i.e. statements limiting the use and distribution of LI, that are securely bound to the LI, as a means to reduce this threat. Constraints may themselves reveal information to any ...
متن کاملPrivacy Enhancements in the Mobile Internet
While the mobile Internet makes available location-based as well as other useful services to the mobile users, risks to the user’s privacy have to be taken into consideration. Personal user data, such as traffic data, location data, device and user specific capability and preference information, and content data is exposed at different sites, such as the WAP gateway/proxy or the origin server’s...
متن کاملA Review on Privacy Control Techniques in Context-aware Web Services
A context is being termed as " some information which can be utilized to identify the present condition of any entity " [1]. In a real time scenario, numerous examples related to the context are given such as location, time, temperature, noise, the bandwidth of communication, connectivity of network etc. " A system is considered to be context aware if it utilizes the context in an effort to pro...
متن کاملA Collaborative Approach to Enhance Security in Location Based Services by Answering Range Queries in WSN
We propose a privacy preserved location monitoring system using wireless sensor network. Here we are using two localized algorithms such as Resource aware algorithm and Quality aware algorithm. Our aim is to provide high quality privacy preserved Location Based Services for the user. If user is giving query , person will receive only aggregate location information based on K-anonymity value whi...
متن کامل