Concepts for personal location privacy policies
Proceedings of the 3rd ACM conference on Electronic Commerce
Framework for security and privacy in automotive telematics
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
Project Aura: Toward Distraction-Free Pervasive Computing
IEEE Pervasive Computing
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Mix Zones: User Privacy in Location-aware Services
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Implementing access control to people location information
Proceedings of the ninth ACM symposium on Access control models and technologies
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk
International Journal of Mobile Communications
Providing location privacy in pervasive computing through a hybrid mechanism
International Journal of Internet Technology and Secured Transactions
Hi-index | 0.00 |
In ubiquitous computing environment, every service should have the characteristic of context-awareness. Since physical location is important information to grasp a user’s context, the service provider should maintain the location information of the user to provide necessary service. When a malicious user acquires the location information of any other user, it is possible that he/she deduces the context of the user. Although there have been many researches for the problem, previous methods impose complex computation and many subjects requires on the system in order to gain acceptable anonymity. In this paper, we propose an effective method that protects the location privacy in ubiquitous computing environment. This method prohibits the malicious user from hijacking the location information by diffusing the information. It also confuses the attacker with transmitting dummy messages as normal users do.