Semantic Web Technologies for Context-Aware Museum Tour Guide Applications
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming
IEEE Transactions on Knowledge and Data Engineering
Towards Privacy-Aware Location-Based Database Servers
ICDEW '06 Proceedings of the 22nd International Conference on Data Engineering Workshops
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Secure and useful data sharing
Decision Support Systems
An Authentication Model Involving Trusted Third Party for M-Commerce
ICMB '07 Proceedings of the International Conference on the Management of Mobile Business
A Cloaking Algorithm Based on Spatial Networks for Location Privacy
SUTC '08 Proceedings of the 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008)
Privacy in location-based services: a system architecture perspective
SIGSPATIAL Special
Scalable and Reliable Location Services through Decentralized Replication
ICWS '09 Proceedings of the 2009 IEEE International Conference on Web Services
A distributed k-anonymity protocol for location privacy
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
AnonTwist: Nearest Neighbor Querying with Both Location Privacy and K-anonymity for Mobile Users
MDM '09 Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
Location aware public/personal diversity of information services based on embedded RFID platform
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Design of SHA-1 Algorithm Based on FPGA
NSWCTC '10 Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 01
Achieving K-anonymity in mobile ad hoc networks
NPSEC'05 Proceedings of the First international conference on Secure network protocols
AnonySense: A system for anonymous opportunistic sensing
Pervasive and Mobile Computing
Hi-index | 0.00 |
Recently, location based services (LBS) have become more important in today technology advancements. Privacy issue in LBS is one of the most important concerns. In this paper, we have proposed an anonymity preserving framework which can provide a user with more privacy in both authenticating and querying processes. In our framework, an authentication protocol has been proposed, in order to strengthen a privacy, a technique called "Timed Fuzzy Logic" is used. In querying processes of location based services, the use of the Anonymizer, a trusted third party, to provide users anonymous querying and requesting processes is presented. Moreover, when concerning on privacy in user's context, k-anonymity cloaking has been employed for the purpose of preventing user's current location from tracking.