SocialCloaking: A distributed architecture for K-anonymity location privacy protection

Ren Hung Hwang, Fu Hui Huang

研究成果: Paper同行評審

8 引文 斯高帕斯(Scopus)

摘要

As location information becomes commonly available in smart phones, applications of Location Based Service (LBS) has also become very popular and are widely used by smart phone users. Since the query of LBS contains user's location, it raises a privacy concern of exposure of user's location. K-anonymity is a commonly adopted technique for location privacy protection. In the literature, a centralized architecture which consists of a trusted anonymity server is widely adopted. However, this approach exhibits several apparent weaknesses, such as single point of failure, performance bottleneck, serious security threats, and not trustable to users, etc. In this paper, we re-examine the location privacy protection problem in LBS applications. We first provide an overview of the problem itself, to include types of query, privacy protection methods, adversary models, system architectures, and their related works in the literature. We then discuss the challenges of adopting a distributed architecture which does not need to set up a trusted anonymity server and propose a solution by combining unique features of structured peer-to-peer architecture and trust relationships among users of their on-line social networking relations.

原文English
頁面247-251
頁數5
DOIs
出版狀態Published - 2014
事件2014 International Conference on Computing, Networking and Communications, ICNC 2014 - Honolulu, HI, United States
持續時間: 3 2月 20146 2月 2014

Conference

Conference2014 International Conference on Computing, Networking and Communications, ICNC 2014
國家/地區United States
城市Honolulu, HI
期間3/02/146/02/14

指紋

深入研究「SocialCloaking: A distributed architecture for K-anonymity location privacy protection」主題。共同形成了獨特的指紋。

引用此