Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2017, Article ID 2189646, 11 pages
https://doi.org/10.1155/2017/2189646
Research Article

A Hybrid Location Privacy Solution for Mobile LBS

Department of Computer Engineering, National Institute of Technology, Surat, Gujarat 395007, India

Correspondence should be addressed to Ruchika Gupta; moc.liamg@900tpugr

Received 9 December 2016; Revised 2 March 2017; Accepted 8 March 2017; Published 18 June 2017

Academic Editor: Jaegeol Yim

Copyright © 2017 Ruchika Gupta and Udai Pratap Rao. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. Wells, N. Beck, A. Kleusberg et al., Guide to GPS Positioning, Canadian GPS Associates, New Brunswick, Canada, 1987.
  2. A. Jafarnia-Jahromi, A. Broumandan, J. Nielsen, and G. Lachapelle, “GPS vulnerability to spoofing threats and a review of antispoofing techniques,” International Journal of Navigation and Observation, vol. 2012, Article ID 127072, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. M. F. Mokbel, “Privacy in location-based services: state-of-the-art and research directions,” in Proceedings of the 8th International Conference on Mobile Data Management (MDM '07), p. 228, IEEE, Mannheim, Germany, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Krumm, “Inference attacks on location tracks,” in Pervasive Computing, pp. 127–143, Springer, Berlin, Germany, 2007. View at Google Scholar
  5. D. Song and K. Park, “A privacy-preserving location-based system for continuous spatial queries,” Mobile Information Systems, vol. 2016, Article ID 6182769, 9 pages, 2016. View at Publisher · View at Google Scholar
  6. P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719–1733, 2007. View at Publisher · View at Google Scholar · View at Scopus
  7. M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: query processing for location services without compromising privacy,” in Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763–774, VLDB Endowment, 2006.
  8. M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42, ACM, May 2003. View at Publisher · View at Google Scholar
  9. G. Ghinita, P. Kalnis, and S. Skiadopoulos, “Mobihide: a mobilea peerto-peer system for anonymous location-based queries,” in Advances in Spatial and Temporal Databases, pp. 221–238, Springer, Berlin, Germany, 2007. View at Google Scholar
  10. E. K. Wang and Y. Ye, “A new privacy-preserving scheme for continuous query in location-based social networking services,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 979201, 2014. View at Publisher · View at Google Scholar · View at Scopus
  11. M. Zhou, X. Li, and L. Liao, “On preventing location attacks for urban vehicular networks,” Mobile Information Systems, vol. 2016, Article ID 5850670, 13 pages, 2016. View at Publisher · View at Google Scholar
  12. K. Sampigethaya, M. Li, L. Huang, and R. Poovendran, “AMOEBA: robust location privacy scheme for VANET,” IEEE Journal on Selected Areas in Communications, vol. 25, no. 8, pp. 1569–1589, 2007. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Freudiger, M. Raya, M. Félegyházi, P. Papadimitratos, and J.-P. Hubaux, “Mix-zones for location privacy in vehicular networks,” in Proceedings of the ACM Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS '07), Vancouver, Canada, 2007.
  14. F. Kargl and J. Petit, “Security and privacy in vehicular networks,” in Vehicular Communications and Networks: Architectures, Protocols, Operation and Deployment, pp. 171–189, 2015. View at Google Scholar
  15. Y. Gai, J. Lin, and B. Krishnamachari, “Security and privacy in vehicular networks,” Cognitive Vehicular Networks, pp. 151–166, 2016. View at Google Scholar
  16. C.-Y. Chow, M. F. Mokbel, and X. Liu, “A peer-to-peer spatial cloaking algorithm for anonymous location-based service,” in Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems (ACM-GIS '06), pp. 171–178, ACM, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  17. M. Langheinrich, “Privacy by designprinciples of privacy-aware ubiquitous systems,” in Ubicomp 2001: Ubiquitous Computing, pp. 273–291, Springer, Berlin, Germany, 2001. View at Google Scholar
  18. G. Ghinita, P. Kalnis, and S. Skiadopoulos, “Prive: anonymous locationbased queries in distributed mobile systems,” in Proceedings of the 16th International Conference on World Wide Web, pp. 371–380, ACM, 2007.
  19. H. Zhangwei and X. Mingjun, “A distributed spatial cloaking protocol for location privacy,” in Proceedings of the 2nd International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC '10), vol. 2, pp. 468–471, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, “Geo-indistinguishability: differential privacy for location-based systems,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS '13), pp. 901–914, ACM, Berlin, Germany, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  21. R. Koorn, H. van Gils, J. ter Hart, P. Overbeek, R. Tellegen, and J. Borking, Privacy Enhancing Technologies, White Paper for Decision Makers, 2004.
  22. C. A. Ardagna, M. Cremonini, S. De Capitani Di Vimercati, and P. Samarati, “An obfuscation-based approach for protecting location privacy,” IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 1, pp. 13–27, 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, “Private queries in location based services: anonymizers are not necessary,” in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD '08), pp. 121–132, ACM, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  24. A. Khoshgozaran, H. Shirani-Mehr, and C. Shahabi, “SPIRAL: a scalable private information retrieval approach to location privacy,” in Proceedings of the 9th International Conference on Mobile Data Management Workshops (MDMW '08), pp. 55–62, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. A. Khoshgozaran and C. Shahabi, “Private information retrieval techniques for enabling location privacy in location-based services,” in Privacy in Location-Based Applications, pp. 59–83, Springer, 2009. View at Google Scholar
  26. J. Domingo-Ferrer, “Microaggregation for database and location privacy,” in Next Generation Information Technologies and Systems, pp. 106–116, Springer, 2006. View at Google Scholar
  27. T. Okamoto and S. Uchiyama, “A new public-key cryptosystem as secure as factoring,” in Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, pp. 308–318, Springer, 1998.
  28. A. Solanas and A. Martínez-Ballesté, “A TTP-free protocol for location privacy in location-based services,” Computer Communications, vol. 31, no. 6, pp. 1181–1191, 2008. View at Publisher · View at Google Scholar · View at Scopus
  29. R. Rothblum, “Homomorphic encryption: from private-key to publickey,” in Proceedings of the Theory of Cryptography Conference, pp. 219–234, Springer, Providence, RI, USA, March 2011.
  30. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '99), pp. 223–238, Springer, Prague, Czech Republic, 1999.
  31. I. Damgård and M. Jurik, “A generalisation, a simplification and some applications of Paillier's probabilistic public-key system,” in International Workshop on Public Key Cryptography, pp. 119–136, Springer, 2001. View at Google Scholar