Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016, Article ID 7867206, 13 pages
http://dx.doi.org/10.1155/2016/7867206
Research Article

Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing

1Computer Science Department, Notre Dame University-Louaize, Zouk Mosbeh, P.O. Box 72, Lebanon
2UPMC, Sorbonne University, LIP6, Paris, France
3Faculty of Sciences, Lebanese University, LARIFA-EDST, Pierre Gemayel Campus, Fanar, Lebanon
4Telecom SudParis, Institut Telecom, CNRS SAMOVAR, UMR 5751, 9 rue Charles Fourier, 91011 Evry, France

Received 28 January 2016; Accepted 19 June 2016

Academic Editor: Michele Amoretti

Copyright © 2016 Jacques Bou Abdo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. Google Cloud, https://Cloud.google.com/.
  2. A. Bozzon, M. Brambilla, and S. Ceri, “Answering search queries with CrowdSearcher,” in Proceedings of the 21st Annual Conference on World Wide Web (WWW '12), pp. 1009–1018, ACM, Perth, Australia, April 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. B. L. Bayus, “Crowdsourcing new product ideas over time: an analysis of the Dell IdeaStorm community,” Management Science, vol. 59, no. 1, pp. 226–244, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Howe, Crowdsourcing: How the Power of the Crowd Is Driving the Future of Business, Random House, New York, NY, USA, 2008.
  5. M. F. Bulut, Y. S. Yilmaz, and M. Demirbas, “Crowdsourcing location-based queries,” in Proceedings of the 9th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops '11), pp. 513–518, Seattle, Wash, USA, March 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. D. Horowitz and S. D. Kamvar, “The anatomy of a large-scale social search engine,” in Proceedings of the 19th International World Wide Web Conference (WWW '10), pp. 431–440, Raleigh, NC, USA, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. G. Chatzimilioudis, A. Konstantinidis, C. Laoudias, and D. Zeinalipour-Yazti, “Crowdsourcing with smartphones,” IEEE Internet Computing, vol. 16, no. 5, pp. 36–44, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. Chacha.com, http://www.chacha.com/.
  9. Foursquare.com, https://foursquare.com/.
  10. W. S. Lasecki, R. Wesley, J. Nichols, A. Kulkarni, J. F. Allen, and J. P. Bigham, “Chorus: a crowd-powered conversational assistant,” in Proceedings of the 26th Annual ACM Symposium on User Interface Software and Technology (UIST '13), pp. 151–162, St Andrews, UK, October 2013. View at Publisher · View at Google Scholar · View at Scopus
  11. A. Noulas, S. Scellato, C. Mascolo, and M. Pontil, “An empirical study of geographic user activity patterns in foursquare,” in Proceedings of the International Conference on Weblogs and Social Media, AAAI, Barcelona, Spain, July 2011.
  12. How effective drug addiction treatment, http://www.drugabuse.gov/publications/principles-drug-addiction-treatment-research-based-guide-third-edition/frequently-asked-questions/how-effective-drug-addiction-treatment.
  13. Drug Rehab Statistics, http://www.futuresofpalmbeach.com/drug-rehab/statistics/.
  14. J. Bou Abdo, H. Chaouchi, and J. Demerjian, “Security in emerging 4G networks,” in Next-Generation Wireless Technologies: 4G and Beyond, pp. 243–272, Springer, London, UK, 2013. View at Publisher · View at Google Scholar
  15. Location-Based Service, http://en.wikipedia.org/wiki/Location-based_service.
  16. M. E. Nergiz, M. Atzori, and Y. Saygin, “Towards trajectory anonymization: a generalization-based approach,” in Proceedings of the SIGSPATIAL ACM GIS International Workshop on Security and Privacy in GIS and LBS (SPRINGL '08), pp. 52–61, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Steiniger, M. Neun, and A. Edwardes, Foundations of Location Based Services, Lecture Notes on LBS, v. 1.0, 2006.
  18. D. Quercia, N. Lathia, F. Calabrese, G. Di Lorenzo, and J. Crowcroft, “Recommending social events from mobile phone location data,” in Proceedings of the IEEE 10th International Conference on Data Mining (ICDM ' 10), pp. 971–976, IEEE, Sydney, Australia, 2010. View at Publisher · View at Google Scholar
  19. B. Jiang and X. Yao, “Location-based services and GIS in perspective,” Computers, Environment and Urban Systems, vol. 30, no. 6, pp. 712–725, 2006. View at Publisher · View at Google Scholar · View at Scopus
  20. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, “Private queries in location based services: anonymizers are not necessary,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '08), pp. 121–132, ACM, 2008. View at Publisher · View at Google Scholar
  21. G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, “A hybrid technique for private location-based queries with database protection,” in Advances in Spatial and Temporal Databases, N. Mamoulis, T. Seidl, T. B. Pedersen, K. Torp, and I. Assent, Eds., vol. 5644 of Lecture Notes in Computer Science, pp. 98–116, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  22. L. Sweeney, “k-anonymity: a model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557–570, 2002. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  23. Generation Partnership Project, 3GPP T TR 33.821 V9.0.0 (2009-06), 3GPP Rationale and Track of Security Decisions in Long Term Evolved (LTE) RAN/3GPP System Architecture Evolution (SAE) (Release 9).
  24. J. Bou Abdo, J. Demerjian, and H. Chaouchi, “Security V/S Qos for LTE authentication and key agreement protocol,” International Journal of Network Security & Its Applications, vol. 4, no. 5, pp. 71–82, 2012. View at Publisher · View at Google Scholar
  25. A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, “L-diversity: privacy beyond k-anonymity,” ACM Transactions on Knowledge Discovery from Data, vol. 1, no. 1, article 3, 2007. View at Publisher · View at Google Scholar · View at Scopus
  26. N. Li, T. Li, and S. Venkatasubramanian, “t-closeness: privacy beyond k-anonymity and l-diversity,” in Proceedings of the IEEE 23rd International Conference on Data Engineering, pp. 106–115, Istanbul, Turkey, April 2007. View at Publisher · View at Google Scholar
  27. X. Liu, K. Liu, L. Guo, X. Li, and Y. Fang, “A game-theoretic approach for achieving k-anonymity in Location Based Services,” in Proceedings of the 32nd IEEE Conference on Computer Communications (IEEE INFOCOM '13), pp. 2985–2993, Turin, Italy, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  28. D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer, “From t-closeness-like privacy to postrandomization via information theory,” IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 11, pp. 1623–1636, 2010. View at Publisher · View at Google Scholar · View at Scopus
  29. J. B. Abdo, J. Demerjian, H. Chaouchi, T. Atechian, and C. Bassil, “Privacy using mobile cloud computing,” in Proceedings of the 5th International Conference on Digital Information and Communication Technology and Its Applications (DICTAP '15), pp. 178–182, IEEE, Beirut, Lebanon, May 2015. View at Publisher · View at Google Scholar · View at Scopus
  30. J. B. Abdo, J. Demerjian, H. Chaouchi, K. Barbar, and G. Pujolle, “Operator centric mobile cloud architecture,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '14), pp. 2982–2987, IEEE, Istanbul, Turkey, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  31. Submitting Your Apple to the Store, https://developer.Apple.com/library/ios/documentation/IDEs/Conceptual/AppDistributionGuide/SubmittingYourApp/SubmittingYourApp.html.