Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Self-Reliant Location Privacy Techniques In Location Based Mobile Applications  
  Authors : Balaso Jagdale; Jagdish Bakal
  Cite as:

 

Tiny hardware of global positioning almost fitted in every mobile device these days which is carried by humans, animals, vehicles and for that matter, any moving objects. Based on this feasibility of location in devices, many location aided applications are being used these days. But revealing location to various service providers to be part of quality of service, pose threat of location privacy. Privacy has got many dimensions including laws, social attitude, governance, commerce and technical. Authors have tried to address above parameters to balance privacy. Revealing location to distributed, trusted parties is also a threat. That is why users’ device should be reliant to work for self-motivated privacy. Our proposed work provides location privacy to the LBS users without using any third party for anonymization. Cloaking mechanisms are suggested with different parameters such as location plaintext in group, location noise, and encryption. Customization is studied that progressively increase the privacy levels. The user can use any of the module depending on the context it is requesting the LBS. Prototype is demonstrated with LBS system and Mobile emulations and delay, communication cost, privacy strength is measured and analyzed among these parameters variation.

 

Published In : IJCSN Journal Volume 6, Issue 3

Date of Publication : June 2017

Pages : 300-309

Figures :09

Tables : --

 

Balaso Jagdale : received the DIE Diploma in Industrial Electronics from Govt. Polytechnic Latur and BE Computer Engineering degree from Pune University in 1992. He received ME in Computer Engineering, from VJTI, under Mumbai University in 1999. Presently he is pursuing Ph.D. in the field of Information Security from GH Raisoni College of Engineering affiliated to RTM Nagpur University, India. He is presently working as an Associate Professor at the Department of Information Technology at MIT College of Engineering, PUNE, INDIA. He has more than 23 years of academics experience including head of computer department at SPCE, Mumbai. He has publications in journals, conference proceedings, and books. His research interests in Information Security and more specific, Information Privacy. He has also a Certified Ethical Hacker certification from EC Council in his credit. He also associated with Govt. committees, University faculty interview- Subject Expert in Pune and Mumbai University. He is Professional Member of ACM and life Member of CSI, IETE, ISTE INDIA.

Dr. Jagdish Bakal : received MTech from (EDT), Electronics Design and Technology Department, from Dr. Babasaheb Ambedkar Marathwada University, Aurangabad. Later, He completed his Ph.D. in the field of Computer Engineering from Bharati Vidyapeeth Deemed University, Pune. He is presently working as Principal at the S.S. Jondhale College of Engineering, Thane, India. In Mumbai University, he was on honorary assignment as a chairman, board of studies in Information Technology and Computer Engineering. He is also associated as chairman or member with Govt. committees, University faculty interview committees, for interviews, LIC or various approval work of institutes. He has more than 27 years of academics experience including HOD, Director in earlier Engineering Colleges in India. His research interests are Telecomm Networking, Mobile Computing, Information Security, Sensor Networks and Soft Computing. He has publications in journals, conference proceedings in his credit. During his academic tenure, he has attended, organized and conducted training programs in Computer, Electronics & Telecomm branches. He is a Professional member of IEEE. He is also a life member of professional societies such as IETE, ISTE INDIA, and CSI INDIA. He has prominently contributed in the governing council of IETE, INDIA

 

Geoinformatics, Location Privacy, Mobile Computing, Location based services, Cloaking

Our location privacy technique improves the existing approach of location privacy from security perspective as, it does not rely on Anonymizer, It is distributed hence no problem of bottleneck at single point, It is strong against the conspiracy of a malicious mobile user and a location service provider.

 

[1] Agusti Solanas, Antoni Antoni Martinez-Balleste, “A TTP-free protocol for location privacy in location-based services”, Journal Computer Communications archive Volume 31 Issue 6, April, 2008 [2] M. Gruteser, D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking.” Proceedings of the First International Conference on Mobile Systems, Applications and Services, 2003. [3] B. Gredik ,L. Liu, “Protecting location privacy with personalized k-anonymity: Architecture and algorithms”, IEEE Transactions on Mobile Computing.(2008) [4] Krishna P.N. Puttaswamy and Ben Y. Zhao, “Preserving Privacy in Location-based Mobile Social Applications”, ACM 978-1-4503-0005, February-2010. [5] C. Chow, Mohammad F. Mokbel and Xan Liu. “A Peerto- Peer Spatial Cloaking Algorithms for Anonymous Location-based Services”, ACM-59593, November 2011. [6] P. Kalnis, G. Ghinita, K. Mouratidis and D. Papadias, “Preventing Location-Based Identity Inference in Anonymous Spatial queries”, IEEE Transactions on Knowledge and Data Engineering-2008. [7] G. Ghinita,P. Kalnis, A. Khoshgozaran, “Private queries in Location based services Anonymisers are not necessary”, Proceedings of the ACM SIGMOD international conference on Management of data, 2008. [8] Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos. “PRIVE: Anonymous Location-Based Queries in Distributed Mobile Systems”, ACM Transaction-978-1- 59593, 2007. [9] P. Samarati, "Protecting respondents identities in microdata release", IEEE Transactions on Knowledge and Data Engineering, Vol. 13, No. 6, pages 1010-1027, 2001. [10] Paillier, Pascal. "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes." Advances in Cryptology. 99. Web. 20 Oct. 2009. [11] P. Samarati, L. Sweeney, "Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression", Technical report, SRI International, 1998. [12] TeodorIulian Alecu, Sviatoslav Voloshynovskiy and Thierry Pun, “The Gaussian Transform of Distributions: Definition”, IEEE transaction on Computation and Application.2006. [13] M.F. Mokbel, Chi-Yin Chow, “Challenges in preserving location privacy in peer-to-peer environments” in Seventh International Conference on Web-Age Information Management Workshops.China.June 2006. [14] Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, and Jean-Pierre Hubaux, “Hiding in the Mobile Crowd: Location Privacy through Collaboration”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 11, NO. 3, MAY-JUNE 2014. [15] B N Jagdale, Bakal J W, “Controlled Broadcast Protocol for Location Privacy in Mobile Applications”, International Conference on Information Security and Privacy, ICISP, Pages 782-789, 2015. [16] C. Piao, Changyou Zhang, et al. “User privacy protection for a mobile commerce alliance”, Elsevier Journal on Electronic Commerce Research and Applications Vol. 18, Pages 58–70, 2016.