Browse > Article
http://dx.doi.org/10.6109/jkiice.2013.17.10.2316

Real Time User Location Information Protection Model Using Anonymity  

Mun, Hyung-Jin (College of Electrical & Computer Engineering, Chungbuk National University)
Abstract
Due to the development of ICT, with using hardwares such as WiFi, 3G and GPS and so on, smartphone could have provided a lot of applications with novel functions rapidly. Through such applications, lots of personal information such as personal location, personal images, and list of phone calls is created, saved and widely used. Because there is lots of leakage of the stored personal information due to loss of phone and application, privacy violation have been important issue nowadays. Smartphone with GPS and Internet provides location information. To protect the information, the technologies that only the authorized user can access it while inquiring the location information have been proposed. In this paper, to minimize the identification information for location information subject and information user and anonymize the identifiable information such as phone number, we proposed a model that can reduce the leakage of information and avoid the wrong usage of the stored information in the server. This technique will be used for protecting privacy when developing the application that provides routing service through location history information.
Keywords
Anonymity; LBS; Privacy Protection; Smartphone;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 PewInternet. Smartphone Ownership 2013 [Internet]. Available:http://pewinternet.org/Reports/2013/smartphoneownership- 2013/Findings.aspx
2 Gartner. November Report(2013) [Internet]. Available: http://www.gartner.com/newsroom/id/2335616.
3 Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W.Freeh, "Taming Information-Stealing Smartphone Application (on Android)," in Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST 2011), Pittsburgh, PA, pp.93-107, 2011.
4 Seokhoon Ko, "A Trend of Android Platform," The Korea Contents Association Review, vol. 8, no. 2, pp.45-49, Jun. 2010.
5 Shane Conder and Lauren Darcey, "Android Wireless Application Development," in Addison-Wesley Professional, 2nd ed. Pearson Education, pp. 54-138, 2010.
6 Google. Android Market [Internet]. Available: https://market.android.com/
7 Wo-jun Jang, Hyong-Woo Lee. "Development of Secure Access Control System for Location Information on Smart Phone", Journal of the Korea Institute of Information Security and Cryptology ,Vol. 21, no. 2, pp.139-147, Apr.2011.
8 In-jai Kim, Jae-won Choi, Woon-Yoeng Kim, "The Application for the Protection System of Location-based Information on a Smart-phone Environment," The Journal of Society for e-Business Studies, vol.17, no.3, pp.129-147; Aug. 2012.
9 KISA. The Analysis on the Research of Practical Use of Location Information[Internet]. Available: http://www.kisa.or.kr/public/library/reportView.jsp?regno=011546
10 HyonJun Bea," Google Android programming: application Structure Analysis," Maso Interactive, pp.236-242, 2008.
11 Hyung-Jin Mun , "Research for Reverse Engineering about Android APP," In Proceeding of the IT Convergence Society for SMB, Korea, pp87-90, 2012.