Modeling and Performance Comparison of Privacy Approaches for Location Based Services

11/14/2017
by   Pratima Biswas, et al.
0

In pervasive computing environment, Location Based Services (LBSs) are getting popularity among users because of their usefulness in day-to-day life. LBSs are information services that use geospatial data of mobile device and smart phone users to provide information, entertainment and security in real time. A key concern in such pervasive computing environment is the need to reveal the user's exact location which may allow an adversary to infer private information about the user. To address the privacy concerns of LBS users, a large number of security approaches have been proposed based on the concept of k-anonymity. The central idea in location k-anonymity is to find a set of k-1 users confined in a given geographical area of the actual user, such that the location of these k users are indistinguishable from one another, thus protecting the identity of the user. Although a number of performance parameters like success rate, amount of privacy achieved are used to measure the performance of the k-anonymity approaches, they make the implicit, unrealistic assumption that the k-1 users are readily available. As such these approaches ignore the turnaround time to process a user request, which is crucial for a real-time application like LBS. In this work, we model the k-anonymity approaches using queuing theory to compute the average sojourn time of users and queue length of the system. To demonstrate that queuing theory can be used to model all k-anonymity approaches, we consider graph-based k-anonymity approaches. The proposed analytical model is further validated with experimental results.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/21/2022

Revisiting a Privacy-Preserving Location-based Service Protocol using Edge Computing

Location-based services are getting more popular day by day. Finding nea...
research
05/16/2018

Privacy Preservation in Location-Based Services: A Novel Metric and Attack Model

Recent years have seen rising needs for location-based services in our e...
research
04/26/2018

NEXUS: Using Geo-fencing Services without revealing your Location

While becoming more and more present in our every day lives, services th...
research
02/05/2018

PinMe: Tracking a Smartphone User around the World

With the pervasive use of smartphones that sense, collect, and process v...
research
04/20/2020

A Secure Location-based Alert System with Tunable Privacy-Performance Trade-off

Monitoring location updates from mobile users has important applications...
research
04/04/2022

JShelter: Give Me My Browser Back

The Web is used daily by billions. Even so, users are not protected from...
research
12/10/2020

Data Privacy in Trigger-Action IoT Systems

Trigger-action platforms (TAPs) allow users to connect independent IoT o...

Please sign up or login with your details

Forgot password? Click here to reset