Skip to main content

2017 | OriginalPaper | Buchkapitel

Privacy in Location Based Services: Protection Strategies, Attack Models and Open Challenges

verfasst von : Priti Jagwani, Saroj Kaushik

Erschienen in: Information Science and Applications 2017

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The increasing capabilities of position determination technologies (e.g., GPS) in mobile and hand held device facilitates the widespread use of Location Based Services (LBS). Although LBSs are providing enhanced functionalities and convenience of ubiquitous computing, they open up new vulnerabilities that can be exploited to target violation of security and privacy of users. For these applications to perform, location of the individual/user is required. Consequently they may pose a major privacy threat on its users. So for LBS applications to succeed, privacy and confidentiality are key issues. “Privacy protection” has become the buzz word now days for the users of location based services. This problem has gained a considerable attention among the researcher community also. A state-of-art survey of privacy in location based services containing details of all privacy protection schemes is presented. Further, attack models and their handling mechanism are discussed in comprehensive manner. Finally, some open challenges in the area of location privacy are also demonstrated.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Bettini, C., Mascetti, S., Wang, X.S., Freni, D., Jajodia, S.: Anonymity and historical-anonymity in location-based services. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol. 5599, pp. 1–30. Springer, Heidelberg (2009). doi:10.1007/978-3-642-03511-1_1 CrossRef Bettini, C., Mascetti, S., Wang, X.S., Freni, D., Jajodia, S.: Anonymity and historical-anonymity in location-based services. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol. 5599, pp. 1–30. Springer, Heidelberg (2009). doi:10.​1007/​978-3-642-03511-1_​1 CrossRef
3.
Zurück zum Zitat Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Proceedings of Privacy Enhancing Technology Workshop (2006) Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Proceedings of Privacy Enhancing Technology Workshop (2006)
4.
Zurück zum Zitat Chow, C.-Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007). doi:10.1007/978-3-540-73540-3_15 CrossRef Chow, C.-Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007). doi:10.​1007/​978-3-540-73540-3_​15 CrossRef
5.
Zurück zum Zitat Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: PERVASIVE 2005 (2005) Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: PERVASIVE 2005 (2005)
6.
Zurück zum Zitat Duckham, M., Kulik, L.: Simulation of obfuscation and negotiation for location privacy. In: Cohn, A.G., Mark, D.M. (eds.) COSIT 2005. LNCS, vol. 3693, pp. 31–48. Springer, Heidelberg (2005). doi:10.1007/11556114_3 CrossRef Duckham, M., Kulik, L.: Simulation of obfuscation and negotiation for location privacy. In: Cohn, A.G., Mark, D.M. (eds.) COSIT 2005. LNCS, vol. 3693, pp. 31–48. Springer, Heidelberg (2005). doi:10.​1007/​11556114_​3 CrossRef
7.
Zurück zum Zitat Ghinita, G., Kalnis, P., Skiadopoulos, S.: Prive: anonymous location-based queries in distributed mobile systems. In: Proceedings of WWW 2007 (2007) Ghinita, G., Kalnis, P., Skiadopoulos, S.: Prive: anonymous location-based queries in distributed mobile systems. In: Proceedings of WWW 2007 (2007)
8.
Zurück zum Zitat Gidofalvi, G., Huang, X., Pedersen, T.B.: Privacy-preserving data mining on moving objects trajectories. In: Proceedings of MDM 2007 (2007) Gidofalvi, G., Huang, X., Pedersen, T.B.: Privacy-preserving data mining on moving objects trajectories. In: Proceedings of MDM 2007 (2007)
9.
Zurück zum Zitat Gkoulalas-Divanis, A., Verykios, V.S.: A privacy-aware trajectory tracking query engine. SIGKDD Explor. Newsl. 10(1), 40–49 (2008)CrossRef Gkoulalas-Divanis, A., Verykios, V.S.: A privacy-aware trajectory tracking query engine. SIGKDD Explor. Newsl. 10(1), 40–49 (2008)CrossRef
10.
Zurück zum Zitat Gkoulalas-Divanis, A., Verykios, V.S., Mokbel, M.F.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of SDM 2009 (2009) Gkoulalas-Divanis, A., Verykios, V.S., Mokbel, M.F.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of SDM 2009 (2009)
11.
Zurück zum Zitat Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of MobiSys 03, pp. 31–42 (2003) Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of MobiSys 03, pp. 31–42 (2003)
12.
Zurück zum Zitat Hoh, B., et al.: Enhancing security and privacy in transaction monitoring systems. IEEE Pervasive Comput. 5(4), 3846 (2006) Hoh, B., et al.: Enhancing security and privacy in transaction monitoring systems. IEEE Pervasive Comput. 5(4), 3846 (2006)
13.
Zurück zum Zitat Jagwani, P., Kaushik, S.: Defending location privacy using zero knowledge proof concept in location based services. In: Proceedings of MDM 2012, Bangluru, India (2012) Jagwani, P., Kaushik, S.: Defending location privacy using zero knowledge proof concept in location based services. In: Proceedings of MDM 2012, Bangluru, India (2012)
14.
Zurück zum Zitat Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. TKDE 19(12), 1719–1733 (2007) Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. TKDE 19(12), 1719–1733 (2007)
15.
Zurück zum Zitat Kaushik, S., Tiwari, S., Goplani, P.: Reducing dependency on middleware for pull based active services in LBS systems. In: Sénac, P., Ott, M., Seneviratne, A. (eds.) ICWCA 2011. LNICSSITE, vol. 72, pp. 90–106. Springer, Heidelberg (2012). doi:10.1007/978-3-642-29157-9_9 CrossRef Kaushik, S., Tiwari, S., Goplani, P.: Reducing dependency on middleware for pull based active services in LBS systems. In: Sénac, P., Ott, M., Seneviratne, A. (eds.) ICWCA 2011. LNICSSITE, vol. 72, pp. 90–106. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-29157-9_​9 CrossRef
16.
Zurück zum Zitat Khoshgozaran, A., Shahabi, C.: Private information retrieval techniques for enabling location privacy in location-based services. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications, October 2009. ISBN: 978-3-642-03510-4 Khoshgozaran, A., Shahabi, C.: Private information retrieval techniques for enabling location privacy in location-based services. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications, October 2009. ISBN: 978-3-642-03510-4
17.
Zurück zum Zitat Khoshgozaran, A., Shahabi, C.: A taxonomy of approaches to preserve location privacy in location-based services. Int. J. Comput. Sci. Eng. 5(2), 86–96 (2010)CrossRef Khoshgozaran, A., Shahabi, C.: A taxonomy of approaches to preserve location privacy in location-based services. Int. J. Comput. Sci. Eng. 5(2), 86–96 (2010)CrossRef
18.
Zurück zum Zitat Khuong, V., Zheng, R.: Efficient algorithms for K-anonymous location privacy in participatory sensing. In: IEEE Infocom Proceedings 2012 (2012) Khuong, V., Zheng, R.: Efficient algorithms for K-anonymous location privacy in participatory sensing. In: IEEE Infocom Proceedings 2012 (2012)
19.
Zurück zum Zitat Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005 (2005) Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005 (2005)
20.
21.
Zurück zum Zitat Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally private information retrieval. In: FOCS (1997) Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally private information retrieval. In: FOCS (1997)
22.
Zurück zum Zitat Lee, B., Oh, J., Yu, H., Kim, J.: Protecting location privacy using location semnatics. In: KDD 2011, August 21–24, San Diego, California, USA (2011) Lee, B., Oh, J., Yu, H., Kim, J.: Protecting location privacy using location semnatics. In: KDD 2011, August 21–24, San Diego, California, USA (2011)
23.
Zurück zum Zitat Lee, K., Lee, W.C., Leong, H.V., Zheng, B.: Navigational path privacy protection: navigational path privacy protection. In: Proceedings of CIKM 2009 (2009) Lee, K., Lee, W.C., Leong, H.V., Zheng, B.: Navigational path privacy protection: navigational path privacy protection. In: Proceedings of CIKM 2009 (2009)
24.
Zurück zum Zitat Liu, L.: Privacy and location anonymization in location-based services. SIGSPATIAL Spec. 1(2), 15–22 (2009)CrossRef Liu, L.: Privacy and location anonymization in location-based services. SIGSPATIAL Spec. 1(2), 15–22 (2009)CrossRef
25.
Zurück zum Zitat Liu, L.: From data privacy to location privacy. In: VLDB 2007, pp. 1429–1430 (2007) Liu, L.: From data privacy to location privacy. In: VLDB 2007, pp. 1429–1430 (2007)
26.
Zurück zum Zitat Mokbel Mohammad, F.: Privacy-preserving location services. In: ICDM 2008 (2008) Mokbel Mohammad, F.: Privacy-preserving location services. In: ICDM 2008 (2008)
27.
Zurück zum Zitat Mokbel, M.F., Chow, C.Y., Aref, W.G.: The newcasper: query processing for location services without compromising privacy. In: Proceedings of VLDB 2006 (2006) Mokbel, M.F., Chow, C.Y., Aref, W.G.: The newcasper: query processing for location services without compromising privacy. In: Proceedings of VLDB 2006 (2006)
28.
Zurück zum Zitat Nergiz, M.E., Atzori, M., Sayggn, Y., Gu, B.: Towards trajectory anonymization a generalization based approach. Trans. Data Priv. 2(1), 47–75 (2009)MathSciNet Nergiz, M.E., Atzori, M., Sayggn, Y., Gu, B.: Towards trajectory anonymization a generalization based approach. Trans. Data Priv. 2(1), 47–75 (2009)MathSciNet
29.
Zurück zum Zitat Shokri, R., Freudiger, J., Jadliwala, M., Hubaux, J.-P.: A distortion-based metric for location privacy. In: WPES 2009: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, pp. 21–30, New York, NY, USA. ACM (2009) Shokri, R., Freudiger, J., Jadliwala, M., Hubaux, J.-P.: A distortion-based metric for location privacy. In: WPES 2009: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, pp. 21–30, New York, NY, USA. ACM (2009)
30.
Zurück zum Zitat Shokri, R., et al.: Quantifying location privacy. In: 2011 IEEE Symposium on Security and Privacy. IEEE (2011) Shokri, R., et al.: Quantifying location privacy. In: 2011 IEEE Symposium on Security and Privacy. IEEE (2011)
31.
Zurück zum Zitat Talukder, N., Ahamed, S.I.: Preventing multi-query attack in location-based services. In: Proceedings of the Third ACM Conference on Wireless Network Security. ACM (2010) Talukder, N., Ahamed, S.I.: Preventing multi-query attack in location-based services. In: Proceedings of the Third ACM Conference on Wireless Network Security. ACM (2010)
32.
Zurück zum Zitat Wang, S., Ding, X., Deng, R.H., Bao, F.: Private information retrieval using trusted hardware. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 49–64. Springer, Heidelberg (2006). doi:10.1007/11863908_4 CrossRef Wang, S., Ding, X., Deng, R.H., Bao, F.: Private information retrieval using trusted hardware. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 49–64. Springer, Heidelberg (2006). doi:10.​1007/​11863908_​4 CrossRef
33.
Zurück zum Zitat Wernke, M., et al.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18(1), 163–175 (2014)CrossRef Wernke, M., et al.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18(1), 163–175 (2014)CrossRef
34.
Zurück zum Zitat Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967) Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)
35.
Zurück zum Zitat Williams, P., Sion, R.: Usable PIR. In: NDSS (2008) Williams, P., Sion, R.: Usable PIR. In: NDSS (2008)
36.
Zurück zum Zitat Xu, T., Cai, Y.: Exploring historical location data for anonymity preserving in location-based services. In: Proceedings of INFO-COM 2008 (2008) Xu, T., Cai, Y.: Exploring historical location data for anonymity preserving in location-based services. In: Proceedings of INFO-COM 2008 (2008)
37.
Zurück zum Zitat You, T.H., Peng, W.-C., Lee, W.C.: Protecting moving trajectories with dummies. In: Proceedings of PALMS 2007 (2007) You, T.H., Peng, W.-C., Lee, W.C.: Protecting moving trajectories with dummies. In: Proceedings of PALMS 2007 (2007)
Metadaten
Titel
Privacy in Location Based Services: Protection Strategies, Attack Models and Open Challenges
verfasst von
Priti Jagwani
Saroj Kaushik
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-4154-9_2

Neuer Inhalt