Fundamental challenges in mobile computing
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
Computational geometry in C (2nd ed.)
Computational geometry in C (2nd ed.)
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
How to win the clonewars: efficient periodic n-times anonymous authentication
Proceedings of the 13th ACM conference on Computer and communications security
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
IEEE Transactions on Mobile Computing
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
TRULLO - local trust bootstrapping for ubiquitous devices
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
A secure and optimally efficient multi-authority election scheme
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Safeguarding location privacy in wireless ad-hoc networks
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
A formal model of obfuscation and negotiation for location privacy
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
A practical voter-verifiable election scheme
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Hi-index | 0.00 |
Location-based services are becoming increasingly popular with the proliferation of location aware devices. It is not possible to access location-based services and preserve privacy at the same time when the user provides exact location information. Cloaking or obfuscating location data is the only way to protect location-privacy. To do that, most of the systems use third party location anonymizer. In this paper, we propose a novel location privacy framework without any trusted third party (TTP). Most of the existing solutions attempt to satisfy k-anonymity. However, there are several drawbacks of using fixed and user defined k. In order to solve the problems our proposed solution aims to meet probabilistic k-anonymity. Based on historic data expected number of users present in a place is predicted which is used as probabilistic anonymity level. Thus we eliminate the use of any TTP which results into improvement of query-processing time and provides fewer query results for the user to process eventually minimizing the overall response time. Users' exact location information is not revealed in either communication or computation process.