Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing 2013
DOI: 10.1145/2491266.2491272
|View full text |Cite
|
Sign up to set email alerts
|

Enabling secure location-based services in mobile cloud computing

Abstract: The increasing spread of location-based services (LBSs) has led to a renewed research interest in the security of services. To ensure the credibility and availability of LBSs, there is a pressing requirement for addressing access control, authentication and privacy issues of LBSs in a synergistic way. In this paper, we propose an innovative location-based fine-grained access control mechanism for LBSs, enabling effective finegrained access control, location-based authentication and privacy protection. Our prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…In this kind of solutions [27], [28], one or more third parties relay messages between users and the LBS provider. This approach hides the linkage between user identities and messages from the LBS provider.…”
Section: B Solutions For Public Lbs Onlymentioning
confidence: 99%
“…In this kind of solutions [27], [28], one or more third parties relay messages between users and the LBS provider. This approach hides the linkage between user identities and messages from the LBS provider.…”
Section: B Solutions For Public Lbs Onlymentioning
confidence: 99%
“…[48,49]. However, the development of a fully efficient and secure authentication protocol has proven to be a difficult task to achieve due to the limitations of smart card resources, e.g., battery life and storage capacity [50].…”
Section: Smart Card With Password Based Methodsmentioning
confidence: 99%
“…There are some literatures about this problem. Firstly, a spatiotemporal predicate-based encryption is proposed for fine-grained access control [21]. Then an improved homomorphic encryption [11] is proposed to protect users' privacy and LBS data privacy.…”
Section: Distance Comparison Operatormentioning
confidence: 99%