Location Privacy Techniques in Client-Server Architectures

被引:0
|
作者
Jensen, Christian S. [1 ,2 ]
Lu, Hua [2 ]
Yiu, Man Lung [2 ]
机构
[1] Google Inc, Mountain View, CA 94043 USA
[2] Aalborg Univ, Dept Comp Sci, Aalborg, Denmark
关键词
NEGOTIATION; OBFUSCATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A typical location-based service returns nearby points of interest in response to a user location. As such services are becoming increasingly available and popular, location privacy emerges as an important issue. In a system that does not offer location privacy, users must disclose their exact locations in order to receive the desired services. We view location privacy as an enabling technology that may lead to increased use of location-based services. In this chapter, we consider location privacy techniques that work in traditional client-server architectures without any trusted components other than the client's mobile device. Such techniques have important advantages. First, they are relatively easy to implement, because they do not rely on any trusted third-party components. Second, they have potential for wide application, as the client-server architecture. remains dominant for web services. Third, their effectiveness is independent, of the distribution of other users, unlike the k-anonymity approach. The chapter characterizes the privacy models assumed by existing techniques and categorizes these according to their approach. The techniques are then covered in turn according to their category. The first, category of techniques enlarge the client's position into a region before it is sent to the server. Next, dummy-based techniques hide the user's true location among fake locations, called dummies. In progressive retrieval, candidate results are retrieved iteratively from the server, without. disclosing the exact user location. Finally, transformation-based techniques employ cryptographic transformations so that the service provider is unable to decipher the exact user locations. We end by pointing out promising directions and open problems.
引用
收藏
页码:31 / 58
页数:28
相关论文
共 50 条
  • [1] Understanding the programming techniques for client-server architectures
    Dobrota, V
    Bate, SD
    Cosma, M
    Zinca, D
    [J]. SOFTWARE ENGINEERING IN HIGHER EDUCATION II, 1996, : 303 - 310
  • [2] Beyond the Client-Server Architectures: A Survey of Mobile Cloud Techniques
    Kovachev, Dejan
    Klamma, Ralf
    [J]. 2012 1ST IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA WORKSHOPS (ICCC), 2012, : 20 - 25
  • [3] Client-server database architectures for the web
    Norrie, MC
    [J]. ADVANCES IN MULTIMEDIA AND DATABASES FOR THE NEW CENTURY: A SWISS/JAPANESE PERSPECTIVE, 2000, 10 : 169 - 178
  • [4] SIGNIFICANCE OF CLIENT-SERVER ARCHITECTURES IN - LARGE COMPANIES
    JACCOTTET, B
    [J]. WIRTSCHAFTSINFORMATIK, 1995, 37 (01): : 57 - 64
  • [5] Privacy preserving location-based client-server service using standard cryptosystem
    Onashoga A.
    Sodiya A.
    Osinuga I.
    [J]. Journal of Computing and Information Technology, 2019, 27 (04) : 47 - 63
  • [6] Client-server architectures for distributed learning environments: A proposal
    Arcelli, F
    De Santo, M
    Chianese, A
    [J]. PROCEEDINGS OF THE THIRTY-FIRST HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, VOL VII: SOFTWARE TECHNOLOGY TRACK, 1998, : 395 - 403
  • [7] Transformation of legacy business software into client-server architectures
    Rauber, Thomas
    Ruenger, Gudula
    [J]. ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: DATABASES AND INFORMATION SYSTEMS INTEGRATION, 2007, : 36 - +
  • [8] Performance of CORBA-based client-server architectures
    Abdul-Fatah, I
    Majumdar, S
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2002, 13 (02) : 111 - 127
  • [9] Performance comparison of architectures for client-server interactions in CORBA
    Abdul-Fatah, I
    Majumdar, S
    [J]. 18TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 1998, : 2 - 11
  • [10] WHATS HOT - GATES, WINDOWS, AND CLIENT-SERVER ARCHITECTURES
    KUHFELD, R
    [J]. I&CS-INSTRUMENTATION & CONTROL SYSTEMS, 1995, 68 (09): : 6 - 6