Browse > Article
http://dx.doi.org/10.3745/JIPS.2011.7.1.121

Ensuring Anonymity for LBSs in Smartphone Environment  

Alzaabi, Mohammed (Information Security Group, Khalifa University)
Yeun, Chan-Yeob (Information Security Group, Khalifa University)
Martin, Thomas Anthony (Information Security Group, Khalifa University)
Publication Information
Journal of Information Processing Systems / v.7, no.1, 2011 , pp. 121-136 More about this Journal
Abstract
With the rapid growth of GPS-enable Smartphones, the interest on using Location Based Services (LBSs) has increased significantly. The evolution in the functionalities provided by those smartphones has enabled them to accurately pinpoint the location of a user. Because location information is what all LBSs depend on to process user's request, it should be properly protected from attackers or malicious service providers (SP). Additionally, maintaining user's privacy and confidentiality are imperative challenges to be overcome. A possible solution for these challenges is to provide user anonymity, which means to ensure that a user initiating a request to the SP should be indistinguishable from a group of people by any adversary who had access to the request. Most of the proposals that maintain user's anonymity are based on location obfuscation. It mainly focuses on adjusting the resolution of the user's location information. In this paper, we present a new protocol that is focused on using cryptographic techniques to provide anonymity for LBSs users in the smartphone environment. This protocol makes use of a trusted third party called the Anonymity Server (AS) that ensures anonymous communication between the user and the service provider.
Keywords
Location Based Services; Anonymity; Location Information;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Sweeney, “k-anonymity: a model for protecting privacy”, International Journal on Uncertainty Fuzziness and Knowledge-based Systems, Vol.10, No.5, 2002, pp.557-570.   DOI   ScienceOn
2 H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services”, Proceedings of the International Conference on Pervasive Services (ICPS), Santorini, Greece, 2005 July, pp.88-97.
3 J. I. Hong and J. A. Landay, “An architecture for privacy-sensitive ubiquitous computing”, Proceedings of the International Conference on Mobile Systems (MOBISYS), New York, NY, USA, 2004, pp.177-189.
4 G. Ghinita, P. Kalnis, and S. Skiadopoulos, "Priv'e: Anonymous location-based queries in distributed mobile systems", Proceedings of the International World Wide Web conference, Banff, Canada, 2007 May, pages 476-485.
5 G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. L. Tan, “Private queries in location based services: Anonymizers are not necessary”, Proceedings of the International conference on Management of data (SIGMOD), Vancouver, BC, Canada, 2008 June, pp.121-132.
6 G. Ghinita, P. Kalnis, and S. Skiadopoulos, “Mobihide : A mobile peer-to-peer system for anonymous location-based queries”, Proceedings of the Symposium on Spatial and Temporal Databases (SSTD), Boston, MA, 2007 July, pp.221-238.
7 C. Bettini, X.S. Wang, S. Jajodia, “Protecting privacy against location-based personal identification,” Proceedings of the 2nd VLDB Workshop on Secure Data Management (SDM'05), Trondheim, Norway, 2005 September, pp.185-199.
8 M. Gheorghita, A. Solanas and J. Forne, “Location Privacy in Chain-Based protocols for Location-Based services,” Proceedings of Third International Conference on Digital Telecommunications, Bucharest, Romania, 2008 June, pp.64-69.
9 C. Bettini, L. Pareschi, S. Jajodia. “Anonymity and diversity in LBS: a preliminary investigation,” Proceedings of Fifth IEEE International Conference on Pervasive Computing and Communications (PERCOM-07), DC, USA, 2007 April, pp.577-580.
10 C. Bettini, S. Mascetti, X.S. Wang, and S. Jajodia, “Anonymity in Location-Based Services: Towards a General Framework,” Proceedings of the International Conference on Mobile Data Management, Mannheim, Germany, 2007 May, pp.69-76.
11 D. Chaum, “Untraceable Electronic, Mail Return Addresses, and Digital Pseudonyms”, Communication of the ACM, Vol.24, No.2, 1981, pp.84-90.   DOI   ScienceOn
12 A.Y.Lindell, Anonymous Authentication [online database], http://www.aladdin.com/blog/pdf/AnonymousAuthentication.pdf.
13 A.S. Gajparia, C.Y. Yeun and C. Mitchell, “Using constraints to protect personal location information”, Proceedings of the 58th IEEE Semi-annual VTC 2003-Fall, Orlando, Florida, USA, 2003 October, pp.2112-2116.
14 B. Gedik , L. Liu, “Location Privacy in Mobile Systems: A Personalized Anonymization Model,” Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus, Ohio, USA, 2005 June,pp.620-629.
15 P. Kalnis, G. Ghinita, K. Mouratidis and D. Papadias, “Preventing Location-Based Identity Inference in Anonymous Spatial Queries”, IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE), Vol.19, No.12, 2007, pp.1719-1733.   DOI   ScienceOn
16 D.M. Konidala, C.Y. Yeun and K.J. Kim, “A Secure and Privacy Enhanced Protocol for Locationbased Services in Ubiquitous Society,” Proceedings of IEEE Global Telecommunications Conference 2004, Dallas, Texas, USA, 2004 November, pp.2164-2168.
17 N. Poolsappasit and I. Ray, “Towards Achieving Personalized Privacy for Location-Based Services,” Proceedings of Transactions on Data Privacy 2, Catalonia, Spain, 2009 April, pp.77-99.
18 L.F. Cranor and B.A. LaMacchia, “Spam!,” Communications of the ACM, Vol.41, No.8, 1998, pp.74-83.   DOI   ScienceOn
19 A.S. Gajparia, C.J. Mitchell and C.Y. Yeun, “Supporting User Privacy in Location Based Services,” Proceedings of Mobile Multimedia Communications on IEICE Transactions on Communications, 2005 July, pp.2837-2847.
20 M. Gruteser and D. Grunwald, “Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking,” Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (MobiSys '03), San Francisco, CA, USA, 2003 May, pp.31-42.