Using Broadcast to Protect User Privacy in Location-based Applications

被引:2
|
作者
Liu, Fuyu [1 ]
Hamza-Lup, Georgiana [2 ]
Hua, Kien A. [1 ,3 ]
机构
[1] Univ Cent Florida, Dept EECS, Orlando, FL 32816 USA
[2] Florida Atlantic Univ, Comp Sci & Engn, Boca Raton, FL 33431 USA
[3] Univ Cent Florida, Dept EECS, Orlando, FL 32816 USA
关键词
D O I
10.1109/GLOCOMW.2010.5700201
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Most existing cloaking techniques are based on a three-tier architecture: mobile users, a trusted anonymizer server, and service providers. In this paper, we propose a new three-tier architecture, where the trusted anonymizer server also serves as a broadcast server. The trusted anonymizer server takes a proactive approach. It first groups mobile users into clusters. Then for each cluster, it fetches the most popular query results from service providers. The query results are then broadcast through an air channel to reach all mobile users. As a result, to get a query answered, a mobile user can first tune into the air channel to determine if the query result is available. If not, the mobile user just sends a traditional location-based query to the trusted anonymizer server. Other than the novel new three-tier architecture, we also propose two cell-based clustering algorithms, and a broadcast index to facilitate the download of query results. The proposed techniques are compared using simulation against the improved Interval Cloak technique under the traditional three-tier architecture. The extensive results show that our system is better in reducing communication cost and protecting user privacy.
引用
收藏
页码:1561 / 1565
页数:5
相关论文
共 50 条
  • [1] Preserving User Location Privacy for Location-Based Service
    Chen, Xiaojuan
    Mu, Yi
    [J]. GREEN, PERVASIVE, AND CLOUD COMPUTING, 2016, 9663 : 290 - 300
  • [2] USER PRIVACY PROTECTION FROM TRAJECTORY PERSPECTIVE IN LOCATION-BASED APPLICATIONS
    Trong Nhan Phan
    Tran Khanh Dang
    Kueng, Josef
    [J]. IDIMT-2011: INTERDISCIPLINARITY IN COMPLEX SYSTEMS, 2011, 36 : 281 - +
  • [3] User location privacy protection mechanism for location-based services
    Yan He
    Jiageng Chen
    [J]. Digital Communications and Networks, 2021, 7 (02) - 276
  • [4] User location privacy protection mechanism for location-based services
    He, Yan
    Chen, Jiageng
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (02) : 264 - 276
  • [5] A Step towards User Privacy while Using Location-Based Services
    Abbas, Fizza
    Oh, Heekuck
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2014, 10 (04): : 618 - 627
  • [6] A Cloaking-Based Approach to Protect Location Privacy in Location-Based Services
    Zheng Jiangyu
    Tan Xiaobin
    Zou, Cliff
    Niu Yukun
    Jin, Zhu
    [J]. 2014 33RD CHINESE CONTROL CONFERENCE (CCC), 2014, : 5459 - 5464
  • [7] Using Dynamic Pseudo-IDs to Protect Privacy in Location-Based Services
    Zhu, Xiaoyan
    Chi, Haotian
    Jiang, Shunrong
    Lei, Xiaosan
    Li, Hui
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 2307 - 2312
  • [8] Privacy in location-based social networks: privacy scripts & user practices
    Coppens, Paulien
    Veeckman, Carina
    Claeys, Laurence
    [J]. JOURNAL OF LOCATION BASED SERVICES, 2015, 9 (01) : 1 - 15
  • [9] Constructing dummy query sequences to protect location privacy and query privacy in location-based services
    Zongda Wu
    Guiling Li
    Shigen Shen
    Xinze Lian
    Enhong Chen
    Guandong Xu
    [J]. World Wide Web, 2021, 24 : 25 - 49
  • [10] Constructing dummy query sequences to protect location privacy and query privacy in location-based services
    Wu, Zongda
    Li, Guiling
    Shen, Shigen
    Lian, Xinze
    Chen, Enhong
    Xu, Guandong
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (01): : 25 - 49