Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps

نویسندگان

  • Xiaoen Ju
  • Kang G. Shin
چکیده

The ever-increasing popularity of location-based services (LBSs) poses a serious threat to users’ location privacy. Numerous efforts have been made to protect users’ location privacy and also to limit the degradation of service quality resulting from the additional protection layer. Most existing work, however, relies on a trusted anonymization server, which can itself become one source of untrustworthiness. In this paper, we present EMP—a new location privacy protection scheme based on a quadtree entropy map that enables users to protect their location privacy relying only on their smartphones. EMP reduces the trusted computing base (TCB) and is cost-effective, because it eliminates the requirement of a trusted server from the protection system. In addition, EMP accurately estimates the uncertainty of users’ intended destinations from an adversary’s perspective, and can properly adjust the protection level to defend against sophisticated inference attacks based on the correlation of user queries. Our evaluation of a prototype implementation demonstrates that EMP can effectively protect users’ location privacy with reasonable computation time and resource consumption. EMP complements the common trusted-server-based protection mechanisms and provides smartphone users a secure environment for their use of LBSs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

Location Privacy Preserving of Mobile Users using Secured Homomorphism

In today's highly interconnected world users are increasingly dependent on high end smartphones and mobile devices. Users arrange and plan their daily routines using such high end devices. These applications often rely on current locations of individual users or a group of users to provide the desired service. By means of such applications and services, majority of such user population rev...

متن کامل

MeshCloak: A Map-Based Approach for Personalized Location Privacy

Protecting location privacy in mobile services has recently received significant consideration as Location-Based Service (LBS) can reveal user locations to attackers. A problem in the existing cloaking schemes is that location vulnerabilities may be exposed when an attacker exploits a street map in their attacks. While both real and synthetic trajectories are based on real street maps, most of ...

متن کامل

Location Obfuscation for Privacy in Navigation Applications

Advances in wireless internet, sensor technologies, mobile technologies, and global positioning technologies have renewed interest in location based services (LBSs) among mobile users. LBSs on smartphones allow consumers to locate nearby products and services, in exchange of their location information. Precision of location data helps for accurate query processing of LBSs but it may lead to sev...

متن کامل

Perturbed Anonymization: Two Level Smart Privacy for Lbs Mobile Users

The use of smart mobile devices like tablets, smart phones and navigational gadgets provide most promising communication and better services to mobile users. Location Based Services (LBS) have become very common in recent years. Mobile users submit their location dependent queries to the untrusted LBS server to acquire a particular service. Ideally, user’s personal information such as location ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015