Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Taxonomy of Dummy Generation Techniques for Preserving Location Privacy  
  Authors : Priti Jagwani; Ranjan Kumar
  Cite as: ijcsn.org/IJCSN-2013/2-6/IJCSN-2013-2-6-155.pdf

 

With the advent of GIS, Internet and mobile telephony, Location based services are becoming the need of the day. Privacy issues arising while using location based services have the potential to become the serious apprehensions. Existing privacy techniques based on anonymity generally fails in to offer the required privacy. We are focusing on the dummy generation techniques available in literature to protect location privacy. In these techniques, the actual location of a user along with several false position data (dummies) sent to the service provider. Because the service provider cannot distinguish the true position data, the user’s location privacy is protected. All the available algorithms to generate dummies (for query, locations as well as for trajectories) are reviewed. We briefly discussed and compared all the dummy generation techniques and listed the details of each technique.

 

Published In : IJCSN Journal Volume 2, Issue 6

Date of Publication : 01 December 2013

Pages : 174 - 178

Figures : 04

Tables : 04

Publication Link : ijcsn.org/IJCSN-2013/2-6/IJCSN-2013-2-6-155.pdf

 

 

 

Priti Jagwani : is pursuing PhD in Computer Science from School of IT, IIT Delhi. She has received her M.Tech degree in Computers from IIT Delhi in 2011. She is currently working as an Assistant Professor in Dept. of Computer Science, RLA (E) College, New Delhi, India. Her research interest is location privacy.

Ranjan Kumar : has done his MCA from dept of Computer Science , Univ of Delhi. He is currently working as an assistant professor in Dept. of Computer Science, RLA (E) College, New Delhi, India. His research areas are sensor networks, location based services.

 

 

 

 

 

 

 

Location Privacy

Dummy Generation Techniques

Plausible Deniable search

query privacy

location privacy

 

 

 

Dummy generation techniques for privacy are well suited with both types of architectures (with or without trusted third party). We highlighted dummy generation techniques available for location data, query and trajectory data. A domain of concern is generation of judicious dummies which cannot be distinguished from the real data. Plausible deniable search can be one promising way to address this concern. Although application of PDS for position data and location queries is a future research direction. For generation of judicious dummy data, use of location semantics can also be explored.

 

 

 

 

 

 

 

 

 

[1] Chow, Richard, and Philippe Golle. "Faking contextual data for fun, profit, and privacy." Proceedings of the 8th ACM workshop on Privacy in the electronic society. ACM, 2009.

[2] Kido, Hidetoshi, Yutaka Yanagisawa, and Tetsuji Satoh. "An anonymous communication technique using dummies for location-based services." Pervasive Services, 2005. ICPS'05. Proceedings. International Conference on. IEEE, 2005.

[3] Kido, Hidetoshi, Yutaka Yanagisawa, and Tetsuji Satoh. "Protection of location privacy using dummies for location-based services." Data Engineering Workshops, 2005. 21st International Conference on. IEEE, 2005.

[4] Krumm, John. "Trajectory analysis for driving." Computing with Spatial Trajectories. Springer New York, 2011. 213-241.

[5] Li, Min, Zhiguang Qin, and Cong Wang. "Query-Privacy-Aware Location Cloaking for Mobile P2P System." International Journal Of Future Generation Communication And Networking , VOl 6, no. 4 August 2013.

[6] Lu, Hua, Christian S. Jensen, and Man Lung Yiu. "Pad: Privacy-area aware, dummy-based location privacy in mobile services." Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access. ACM, 2008.

[7] Murugesan, Mummoorthy, and Chris Clifton. "Providing Privacy through Plausibly Deniable Search." SDM. 2009.

[8] Pingley, Aniket, et al. "Protection of query privacy for continuous location based services." INFOCOM, 2011 Proceedings IEEE. IEEE, 2011.

[9] Stenneth, Leon, P. S. Yu, and Ouri Wolfson. "Mobile systems location privacy:“MobiPriv” a robust k anonymous system." Wireless and Mobile Computing, Networking and Communications (WiMob), 2010 IEEE 6th International Conference on. IEEE, 2010.

[10] Xu N, Dan Zhu,Hongyan Liu, Jun He, Xiaoyong Du, Tao Liu. “Combinig Spatial Cloaking and Dummy Generation for Location privacy”. Advanced Data Mining and Applications Lecture Notes in Computer Science Volume 7713, 2012, pp 701-712.

[11] You, Tun-Hao, Wen-Chih Peng, and Wang-Chien Lee. "Protecting moving trajectories with dummies." Mobile Data Management, 2007 International Conference on. IEEE, 2007.