IRJET-Privacy Preserving Location Query Service
Sign up for access to the world's latest research
Abstract
- Location-Based Service (LBS) is a service that provides the information and the number of uses in social network as in security that is accessible through mobile network and finds the geographical location of the mobile device using that location .It is used in different contexts such as entertainment, indoor object search, health. One of its most powerful aspects is that it provides spatial patterns. It evolved from simple based service models to complex tools for implementing any location based service model or facility. The important thing about this service is the data about subscribers location is owned and controlled by the network operators, including mobile carriers and mobile content providers. The privacy of the user in different distributed networks is considered by using location-based query algorithm efficiently. It proposes an algorithm which offers the location query services simultaneously to multiple users thus improving the performance of the server and satisfy the request of users location.
Related papers
A Vehicular Ad-hoc Network (VANET) is a type of Mobile Ad-hoc Network (MANET) that is used to provide communications between nearby vehicles on a hand, and between vehicles and fixed infrastructure on the roadside on the other hand. VANET is not only used for road safety and driving comfort but also for infotainment. An application area which is expected to greatly benefit from this advanced technology is Location Based Service (LBS): a service which helps users in finding nearby places. However, this application raises a privacy issue for these users since it can profile them and track their physical location. Therefore, to successfully deploy LBS, user’s privacy is one of major challenges that must be addressed. In this paper, we propose a location privacy protection scheme to encourage drivers to use this service without any risk of being pursued. Our system was implemented using NS2 network simulator and found to achieve high values of anonymity.
Location Based Services (LBS) is one of the emerging technologies in the mobile, networking and information services. LBS, the branch of computer program-level services used in various fields and support, the application are broadly classified as Maps and Navigation, Information service, Tracking service, Games, Social networking, Vehicular navigation and Advertising. Location is mainly determined into two levels such as internally by a device or externally by systems and kind of networks with which the device interrelates. The advanced mobile networking and communication lend a hand to the civilization with various location based mobile application but while concerning about location privacy, there is most prominent question from the society, how about my location privacy? This article reviews a selected level of privacy in location based services that have been published in the different research journal. The review throws light on the threat and remedy on location privacy in the location based application and services that are represented.
International Journal of Wireless Information Networks
Privacy-preserving in mobile business supplying location-based services (LBS) has the potential to become a primary concern for clients and service providers. In m-business providing LBS services, a client sends its exact locations to service providers. This data may involve sensitive and private personal information. Therefore, the misuse of location information by service providers creates privacy issues for clients. Moreover, the query must not be linked to the mobile client, even if the location information is exposed willingly by her/him to obtain specific services. Thus, there are location cloaking algorithms that allow the protection of the location privacy of mobile users. Hence, many temporal and spatial approaches to cloaking a specific user's location have been proposed. Different from the existing methods, the current works define location and query privacy separately. Therefore, in this paper, we investigate the issues related to the mobile client privacy. Mainly, we aim to preserve the client location privacy as well as the continuous queries privacy, where mobile clients continuously emit different queries during their travels. It's on this premise that we propose a new clique-based cloaking algorithm named Mobile Clique Cloak (MCC) to preserve the mobile client's privacy in the M-business providing LBS services. Also, to build the cloaking region in our approach, we take into account the similarity of client velocity and direction to obtain a right balance between quality of service QoS and privacy. Furthermore, we generate different realistic dummies instead of dropping the query; thus, all queries will be processed even in the case of k−1 other mobile clients' queries cannot be found. Moreover, our work deals with a series of attacks in the same cloaking process (location attack, tracking attack, query sampling attacks and homogenous attack). We evaluate our approach from three aspects: privacy guaranty, quality of service and performance. Experimental evaluation of our algorithms on a real world map shows that our approach ensures total privacy for clients and protects the privacy of clients during the entire query period whiles allowing clients' choice of privacy requirements. Besides, we compare our algorithm with existing privacy protection algorithms such as V-DCA, D-TC and GCA. According to the evaluation results and a comparison of the algorithms, our algorithm MCC can make a good balance between quality of service, performance and privacy.
Journal of Network and Computer Applications, 2018
Location-based applications provide convenient services to users. However, they also lead to location privacy leakage. Malicious adversaries may use the leaked information to violate users' privacy in unpredictable ways. Current location protection algorithms use fake or obfuscated locations to query services, thus resulting in inaccurate results. Usually, these algorithms need to sacrifice quality of service to ensure protection. Location searching services (LSSs) is one kind of location-based service (LBS). Users use LSSs to query nearby locations and exact distances to these locations. Thus, any mistake in results can make LSSs useless. Therefore, current location protection algorithms are not suitable for LSSs. In this paper, we propose a novel algorithm to offer protection for LSSs. In the proposed algorithm, users can have accurate LSSs with powerful location privacy protection. Overhead, in terms of data usage, was introduced in this paper to improve the privacy and decrease the Quality Loss (QL) simultaneously. QL can be decreased to zero if users have a good Internet environment. We derive the privacy and QL calculation methods and also use simulations to calculate the expected privacy and QL. The results illustrate that the proposed algorithm has excellent privacy protection and service quality.
Global journal of computer science and technology, 2019
Recent advancements in technology have opened new avenues for services like the Location based services. Location based services are applications of mobile technology that utilize the information about the location of the user. It uses the Global Positioning System GPS to acquire and transmit user location. Billions of people create an unprecedented amount of data that either includes or allows the inference of highly sensitive information amidst which user location is one of them. However, this information is shared with third party without the knowledge or consent of the user. This is a violation of privacy as some users will or may not want to disclose their location to some people. This paper aims to raise awareness about privacy issues created as a result of location based services. History of location based services were discussed, information privacy and privacy issue surrounding the location based service were also discussed. Despite the myriad opportunities location based s...
Location-based services (LBS) require users to continuously report their location to a potentially untrusted server to obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques for LBS have several limitations, such as requiring a fully-trusted third party, offering limited privacy guarantees and incurring high communication overhead. In this paper, we propose a user-defined privacy grid system called dynamic matrix framework (DMF); the first holistic system that fulfills four essential requirements for privacy-preserving snapshot and continuous LBS. (1) The system only requires a semi-trusted third party, responsible for carrying out simple matching operations correctly. This semi-trusted third party does not have any information about a user's location. (2) Secure snapshot and continuous location privacy is guaranteed under our defined adversary models. (3) The communication cost for the user does not depend on the user's desired privacy level, it only depends on the number of relevant points of interest in the vicinity of the user. (4) Although we only focus on range and k-nearest-neighbor queries in this work, our system can be easily extended to support other spatial queries without changing the algorithms run by the semi-trusted third party and the database server, provided the required search area of a spatial query can be abstracted into spatial regions.
With rapid growth in technology and cost reduction of hardware and storage media, huge amount of data can be acquired and stored. Acquisition and storage of information results in the increase of huge databases. Such databases exceeded the ability of an i ndividual to completely understand and use. The process to analyze such information is more severe in geo - spatial information. In order to analyze and utilize such data repositories to fullest, a few techniques like data mining, expert system, database man agement system, spatial data analysis, machine learning and artificial intelligence etc. have been tried. Nowadays, spatial data mining (SDM) is a well identified domain of data mining. It can be defined as the discovery of interesting, implicit and previo usly unknown knowledge from large spatial data bases .Generally in spatial database the main concern of an individual is with disclosure of their information about personal location history records. An intruder or unauthorized person can acquire informat ion such as frequent locations visits about a particular person by submitting queries by statistical or pattern mining and deriving the required results from extracted records. In this paper, techniques are suggested to protect the location privacy of an individual depending on level of protection they must be provided .
The use of Location Based Services is increased due to the growth of social network and increase in the users of Smartphone's. Many applications provide different kinds of services based on user's location. At that time the user needs to share his/her location with other people or applications. Sharing the location in secured way is still a challenging task. To achieve this, Privacy Preservation Location Query Protocol (PLQP) is used in this work. This protocol allows to set a query for different users for sharing location information. Also, the location information gets encrypted and shared in secured way. I. INTRODUCTION The main aim of Location Based Services is " To assist with the exact information, at right place in real time with personalized setup and location sensitiveness ". In this area we deal with different kinds of devices like desktop as well as smart phones. Location-based services or LBS refer to a set of applications that exploit the knowledge of the geographical position of a mobile device in order to provide services based on that information. Location-based services (LBS) provide the mobile clients personalized services according to their current location. It also offers mobile services, where geographic location enables the services to the users. Examples of such services include Tracking and Monitoring, Information and Navigation. With the rapid development of mobile technologies, these services are made available in handheld devices such as PDAs, smart phones, cell phones and laptops. These services use technologies like GSM/GPRS. Through LBS, a mobile user can enjoy numerous benefits by linking entities of his/her interest during movement. Location based services have made remarkable change in communication but this services are not more secured. To secure the location information of user certain Models/Applications are developed but still the users are not comfortable about their privacy over network. For protecting the location information of users that may be misused by another person, we need a safer way for sharing the location data. Securing the location information is one of the major challenges. Location data security is the security by which we can avoid the misuse of location data. There are some strategies to secure the location data while it being shared like: Sharing the location data with only trusted people. Other way is Providing access control policies like enable or disable of location data and providing privacy control by encrypting the location information.
ingeniería y desarrollo, 2014
Location services have become popular over the last years due to the global adoption of smartphones and the worldwide availability of the Global Positioning System (GPS) and other positioning methods. Locationbased services (LBSs) offer relevant information to users based on their location. Some common applications of LBSs are traffic or public transportation information, search of points of interest (restaurants, stores, etc.), navigation, among others. Despite all the desirable features that these services provide, most of them do not provide adequate protection of the geographical location of the users, putting them at risk if their information falls in wrong hands. This paper presents a compendium of techniques to protect the location privacy of the users, and introduces an approach to compare and evaluate the presented mechanisms and their viability to be used in different kinds of LBSs.
As the mobile networks are springing up, mobile devices have become a must gadget in our daily life. People can easily access Internet application services anytime and anywhere via the hand-carried mobile devices. Most of modern mobile devices are equipped with a GPS module, which can help get the real-time location of the mobile device.Location based services (LBS) aim at delivering point of need information. Personalization and customization of such services, based on the profiles of mobile users, would significantly increase the value of these services.The term Location Based Services (LBS) refers to mobile services in which the user location information is used in order to add value to the service as a whole. The user location information in that case consists of X-Y coordinates generated by any given Location Determination Technology (LDT), such as Cell-ID, A-GPS, EOTD, etc. Since profiles may include sensitive information of mobile users and moreover can help identify a person, customization is allowed only when the security and privacy policies dictated by them are respected.Systems which provide location based services have always been vulnerable to numerous privacy threats. The more we aim at safe usage of location based services, the more we feel the necessity of a secure location privacy system. In this paper. I present the privacy and security issues, along with the threat of location cheating attacks, find the root cause of the vulnerability, and outline the possible defending mechanisms.Designand implementation of solutions for these issues.

Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
References (9)
- C. Dwork, F. McSherryand L. Kulik, "Privacy via distributed noise , 2006.
- Z. Lan, K.-B.Liu, Y.-H. Jiang, X.-Y. Li, Y. Liu, and P.Yang, "Montage: Combine Frames with Movement Continuity for Realtime Multi-User Tracking," in Proc. Of IEEE INFOCOM, 2014 .
- C. Bettini, X. Wang, D. Wei, V. Dave, L. Qiu, and Y. Zhang. Secure Friend Discovery in Mobile Social Networks 185-199, April 2005.
- M. Andres, N. Bordenabe The new casper: query processing for location services without compromising privacy, Proc. of the 2013 ACM SIGSAC Conference on Computer & communications security," in Proceedings of the 32nd, IIT Bangalore.
- Z. Lan, K.-B.Liu, Y.-H. Jiang,An Efficient Sharing of personal Health records Using DABE in Secure Cloud Environment,International Journal of Advanced Research in Coumputer Engineering & Technology, Vol 2, Issue 3,March 2013.
- Cheng-Kang CHU, "An Anonymous Communication Technique Using Dummies for Locationbased Services", Proceedings of IEEE International Conference on Pervasive Services, Singapore Management university. (2005); ICPS.
- Baojiang Cui,Zheli Liu,Key-Aggregate Searchable Encryption(KASE) for Group Data Sharing Via Cloud Storage,IEEE Transactions on Computers,Vol 6,Jan 2014.
- K.manohar,R.AnilKumar, Key-Aggregate Searchable Encryption for Group Data Sharing Via Cloud Storage,International Journal of Computer Engineering in Research Trends,Vol 2,Issue 12,Dec 2015,PP.1132- 1136.
- Vanya Diwan, Shubhra Malhotra,Rachna Jain, Cloud Security Solutions: comparison among various Cryptographic Algorithms, International Journal of Advanced Research in Computer Science and Software Engineering, New Delhi, India.