Tiny hardware of global positioning almost fitted in every mobile device these days which is carried by humans, animals,
vehicles and for that matter, any moving objects. Based on this feasibility of location in devices, many location aided applications are being
used these days. But revealing location to various service providers to be part of quality of service, pose threat of location privacy. Privacy
has got many dimensions including laws, social attitude, governance, commerce and technical. Authors have tried to address above
parameters to balance privacy. Revealing location to distributed, trusted parties is also a threat. That is why users’ device should be reliant
to work for self-motivated privacy. Our proposed work provides location privacy to the LBS users without using any third party for
anonymization. Cloaking mechanisms are suggested with different parameters such as location plaintext in group, location noise, and
encryption. Customization is studied that progressively increase the privacy levels. The user can use any of the module depending on the
context it is requesting the LBS. Prototype is demonstrated with LBS system and Mobile emulations and delay, communication cost,
privacy strength is measured and analyzed among these parameters variation.
Published In:IJCSN Journal Volume 6, Issue 3
Date of Publication : June 2017
Pages : 300-309
Figures :09
Tables : --
Balaso Jagdale : received the
DIE Diploma in Industrial Electronics from
Govt. Polytechnic Latur and BE Computer
Engineering degree from Pune University in
1992. He received ME in Computer
Engineering, from VJTI, under Mumbai
University in 1999. Presently he is pursuing
Ph.D. in the field of Information Security from
GH Raisoni College of Engineering affiliated
to RTM Nagpur University, India. He is
presently working as an Associate Professor at the Department of
Information Technology at MIT College of Engineering, PUNE, INDIA.
He has more than 23 years of academics experience including head of
computer department at SPCE, Mumbai. He has publications in journals,
conference proceedings, and books. His research interests in Information
Security and more specific, Information Privacy. He has also a Certified
Ethical Hacker certification from EC Council in his credit. He also
associated with Govt. committees, University faculty interview- Subject
Expert in Pune and Mumbai University. He is Professional Member of
ACM and life Member of CSI, IETE, ISTE INDIA.
Dr. Jagdish Bakal : received
MTech from (EDT), Electronics Design and
Technology Department, from Dr. Babasaheb
Ambedkar Marathwada University,
Aurangabad. Later, He completed his Ph.D. in
the field of Computer Engineering from Bharati
Vidyapeeth Deemed University, Pune. He is
presently working as Principal at the S.S.
Jondhale College of Engineering, Thane, India.
In Mumbai University, he was on honorary
assignment as a chairman, board of studies in Information Technology and
Computer Engineering. He is also associated as chairman or member with
Govt. committees, University faculty interview committees, for
interviews, LIC or various approval work of institutes. He has more than
27 years of academics experience including HOD, Director in earlier
Engineering Colleges in India. His research interests are Telecomm
Networking, Mobile Computing, Information Security, Sensor Networks
and Soft Computing. He has publications in journals, conference
proceedings in his credit. During his academic tenure, he has attended,
organized and conducted training programs in Computer, Electronics &
Telecomm branches. He is a Professional member of IEEE. He is also a
life member of professional societies such as IETE, ISTE INDIA, and CSI
INDIA. He has prominently contributed in the governing council of IETE,
INDIA
Geoinformatics, Location Privacy, Mobile Computing, Location based services, Cloaking
Our location privacy technique improves the existing
approach of location privacy from security perspective as,
it does not rely on Anonymizer, It is distributed hence no
problem of bottleneck at single point, It is strong against the
conspiracy of a malicious mobile user and a location service
provider.
[1] Agusti Solanas, Antoni Antoni Martinez-Balleste, “A
TTP-free protocol for location privacy in location-based
services”, Journal Computer Communications archive
Volume 31 Issue 6, April, 2008
[2] M. Gruteser, D. Grunwald, “Anonymous usage of
location-based services through spatial and temporal
cloaking.” Proceedings of the First International
Conference on Mobile Systems, Applications and
Services, 2003.
[3] B. Gredik ,L. Liu, “Protecting location privacy with
personalized k-anonymity: Architecture and algorithms”,
IEEE Transactions on Mobile Computing.(2008)
[4] Krishna P.N. Puttaswamy and Ben Y. Zhao, “Preserving
Privacy in Location-based Mobile Social Applications”,
ACM 978-1-4503-0005, February-2010.
[5] C. Chow, Mohammad F. Mokbel and Xan Liu. “A Peerto-
Peer Spatial Cloaking Algorithms for Anonymous
Location-based Services”, ACM-59593, November 2011.
[6] P. Kalnis, G. Ghinita, K. Mouratidis and D. Papadias,
“Preventing Location-Based Identity Inference in
Anonymous Spatial queries”, IEEE Transactions on
Knowledge and Data Engineering-2008.
[7] G. Ghinita,P. Kalnis, A. Khoshgozaran, “Private queries in
Location based services Anonymisers are not necessary”,
Proceedings of the ACM SIGMOD international
conference on Management of data, 2008.
[8] Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos.
“PRIVE: Anonymous Location-Based Queries in
Distributed Mobile Systems”, ACM Transaction-978-1-
59593, 2007.
[9] P. Samarati, "Protecting respondents identities in
microdata release", IEEE Transactions on Knowledge and
Data Engineering, Vol. 13, No. 6, pages 1010-1027, 2001.
[10] Paillier, Pascal. "Public-Key Cryptosystems Based on
Composite Degree Residuosity Classes." Advances in
Cryptology. 99. Web. 20 Oct. 2009.
[11] P. Samarati, L. Sweeney, "Protecting privacy when
disclosing information: k-anonymity and its enforcement
through generalization and suppression", Technical report,
SRI International, 1998.
[12] TeodorIulian Alecu, Sviatoslav Voloshynovskiy and
Thierry Pun, “The Gaussian Transform of Distributions:
Definition”, IEEE transaction on Computation and
Application.2006.
[13] M.F. Mokbel, Chi-Yin Chow, “Challenges in preserving
location privacy in peer-to-peer environments” in Seventh
International Conference on Web-Age Information
Management Workshops.China.June 2006.
[14] Reza Shokri, George Theodorakopoulos, Panos
Papadimitratos, Ehsan Kazemi, and Jean-Pierre Hubaux,
“Hiding in the Mobile Crowd: Location Privacy through
Collaboration”, IEEE TRANSACTIONS ON
DEPENDABLE AND SECURE COMPUTING, VOL. 11,
NO. 3, MAY-JUNE 2014.
[15] B N Jagdale, Bakal J W, “Controlled Broadcast Protocol
for Location Privacy in Mobile Applications”,
International Conference on Information Security and
Privacy, ICISP, Pages 782-789, 2015.
[16] C. Piao, Changyou Zhang, et al. “User privacy protection
for a mobile commerce alliance”, Elsevier Journal on
Electronic Commerce Research and Applications Vol. 18,
Pages 58–70, 2016.