2015
DOI: 10.1007/978-3-319-26502-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Resilient Collaborative Privacy for Location-Based Services

Abstract: Location-based Services (LBSs) provide valuable services, with convenient features for users. However, the information disclosed through each request harms user privacy. This is a concern particularly with honest-but-curious LBS servers, which could, by collecting requests, track users and infer additional sensitive user data. This is the motivation of both centralized and decentralized location privacy protection schemes for LBSs: anonymizing and obfuscating LBS queries to not disclose exact information, whil… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…Decentralization of a system could be due to various reasons, among which privacy is one of the main concerns that motivates the decentralization. It has been considered in many works that the central servers in OSNs or LBSs are tend to collect sensitive information of users and even inferring extra information from the collected data [48], [24], [31]. Such central servers fall into honest-but-curious model.…”
Section: A Decentralizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Decentralization of a system could be due to various reasons, among which privacy is one of the main concerns that motivates the decentralization. It has been considered in many works that the central servers in OSNs or LBSs are tend to collect sensitive information of users and even inferring extra information from the collected data [48], [24], [31]. Such central servers fall into honest-but-curious model.…”
Section: A Decentralizationmentioning
confidence: 99%
“…Pseudonymous can be integrated with different services (and their SPs) to provide secure and privacy preserving VSNs. For example, in [31], a secure and privacy-enhancing LBS is proposed leveraging information sharing and the pseudonymous authentication. Users authenticate their queries and responses under the pseudonyms obtained from the PCA.…”
Section: B Pseudonymous Authenticationmentioning
confidence: 99%
“…An alternative collaborative privacy protection approach is to pass/share LBS-obtained information among users, to decrease exposure to the LBS server [31,55]. The sharing approach requires 1 arXiv:2001.07583v2 [cs.CR] 22 Jan 2020 nodes to cache information received from the LBS and pass it to neighbors when requested.…”
Section: Introductionmentioning
confidence: 99%
“…However, if such k users are too close, e.g., in a church, a shopping mall, or a cinema, such symbolic "addresses" can still be disclosed. Thus, it is hard to define how large k should be to ensure an appropriate level of protection.An alternative collaborative privacy protection approach is to pass/share LBS-obtained information among users, to decrease exposure to the LBS server [31,55]. The sharing approach requires 1 arXiv:2001.07583v2 [cs.CR] 22 Jan 2020 nodes to cache information received from the LBS and pass it to neighbors when requested.…”
mentioning
confidence: 99%
See 1 more Smart Citation