Privacy provision for TIP attributes in NTTP Based LBS Systems
Main Article Content
Abstract
Location Based Services (LBS) are mainly concerned to protect privacy of users because privacy is a core need of any user who deals with any computing system. In LBS systems, privacy is concerned with three fundamental metrics such as temporal information, user identity & spatial information. According to variance of multiple scenarios these three attributes must be protected because losing one’s privacy attribute can lead to full privacy intervention of user. Different strategies are being used to deal these metrics including TTP and NTTP. Therefore the purpose is to bring the privacy at user’s satisfaction level in LBS for user identity, temporal & spatial information attributes by using NTTP (Non-Trusted Third Party). In current study, we have conducted a comprehensive survey on approaches of NTTP in LBS systems. The purpose of survey was to focus on further advancements of these proposed models.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Tyagi, Amit & Sreenath, N. (2015). A Comparative
Study on Privacy Preserving Techniques for Location Based Services. British Journal of Mathematics & Computer Science. 10. 1-25.
Lu Ou, Hui Yin, Zheng Qin, Sheng Xiao, Guangyi Yang, and Yupeng Hu, “An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme,†Security and Communication Networks, vol. 2018. 11 pages, 2018. https://doi.org/10.1155/2018/4724815.
Alrahhal, Mohamad Shady & Khemakhem, Maher & Jambi, Kamal. (2017). A survey on privacy of location-based services: Classification, inference attacks, and challenges. Journal of Theoretical and Applied Information Technology. 3195.
Konstantinos Chatzikokolakis, Ehab Elsalamouny, Catuscia Palamidessi, Anna Pazii. Methods for Location Privacy: A comparative overview. Foundations and Trends in Privacy and Security , Now publishers inc, 2017, 1 (4), pp.199-257.
L Ertaul, IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.3, March 2017
Beye, M., Jeckmans, A., Erkin, Z., Erkin, Z., Hartel, P. H., Lagendijk, R., & Tang, Q. (2010). Literature Overview – Privacy in Online Social Networks. (CTIT Technical Report Series; No. TR-CTIT-10-36). Enschede: Centre for Telematics and Information Technology (CTIT).
J. Chen, K. He, Q. Yuan, M. Chen, R. Du and Y. Xiang, "Blind Filtering at Third Parties: An Efficient Privacy- Preserving Framework for Location-Based Services," in IEEE Transactions on Mobile Computing.
Jinxing Qu, Guoyin Zhang, and Zhou Fang, “Prophet: A Context-Aware Location Privacy-Preserving Scheme in Location Sharing Service,†Discrete Dynamics in Nature and Society, vol. 2017, Article ID 6814832, 11 pages, 2017.
Li Kuang, Yin Wang, Pengju Ma, et al., “An Improved Privacy- Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints,†Security and Communication Networks, vol.2017, Article ID 7495974, 15 pages, 2017.
Chen, L , Thombre , S , Järvinen , K , Lohan , E S , Alén-Savikko , A , Leppäkoski , H , Bhuiyan , M Z H , Bu-Pasha , S , Ferrara , G N , Honkala , S , Lindqvist , J , Ruotsalainen , L , Korpisaari , P & Kuusniemi , H 2017, ' Robustness, Security and Privacy in Location-Based Services for Future IoT : A Survey ' IEEE Access , vol. 5, pp. 8956-8977.
Mohammad Yamin, Adnan Ahmed Abi Sen. "Improving Privacy and Security of User Data in Location Based Services", International Journal of Ambient Computing and Intelligence, 2018
Anuar, Faiz & Gretzel, Ulrike. (2011). Privacy Concerns in the Context of Location-Based Services for Tourism.
Aloudat, Anas & Michael, Katina & Yan, J. (2018). Location-Based Services in Emergency Management-from Government to Citizens: Global Case Studies. Faculty of Informatics – Papers.
Ruchika Gupta and Udai Pratap Rao, “A Hybrid Location Privacy Solution for Mobile LBS,†Mobile Information Systems, vol. 2017, Article ID 2189646,11 pages, 2017.
Palmieri P., Calderoni L., Maio D. (2015) Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications. In: Lin D., Yung M., Zhou J. (eds) Information Security and Cryptology. Inscrypt 2014. Lecture Notes in Computer Science, vol 8957. Springer, Cham.
Solanas, Agusti & Domingo-Ferrer, Josep & Ballesté, Antoni. (2008). Location Privacy in Location-Based Services: Beyond TTP-based Schemes. CEUR Workshop Proceedings. 397.
Qin Hu Shengling Wang, Chunqiang Hu, Jianhui Huang, Wei Li, Xiuzhen Cheng. “Messages in a Concealed Bottle: Achieving Query Content Privacy with Accurate Location-Based Servicesâ€, IEEE Transactions on Vehicular Technology, 2018
Wernke, Marius, Pavel Skvortsov, Frank Dürr, and Kurt Rothermel. “A classification of location privacy attacks and approachesâ€, Personal and Ubiquitous Computing, 2014.
“Achieving location privacy through CAST in location based servicesâ€, Journal of Communications and Networks, 2017
“Spatial Bloom Filters: Enabling Privacy in Location Aware Applicationsâ€, Lecture Notes in Computer Science, 2015.
Shabana Habib, Somaila Saleem, Khawaja Muhammad Saqib. “Review on MANET routing protocols and challenges", 2013 IEEE Student Conference on Research and Development, 2013
Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao “A context-aware scheme for privacy-preserving location-based servicesâ€, Computer Networks, 2012
Piao, Chunhui, Xiaoyan Li, Xiao Pan, and Changyou Zhang. “User privacy protection for a mobile commerce allianceâ€, Electronic Commerce Research and Applications, 2016.
Puttaswamy, Krishna P. N., Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, Amr El Abbadi, Christopher Kruegel, and Ben Y. Zhao. “Preserving Location Privacy in Geo-Social Applicationsâ€, IEEE Transactions on Mobile Computing, 2012.
Vincent Primault, Antoine Boutet, Sonia Ben Mokhtar, Lionel Brunie. “The Long Road to Computational Location Privacy: A Surveyâ€, IEEE Communications Surveys & Tutorials, 2018
Ruchika Gupta, Udai Pratap Rao. "An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Surveyâ€, Wireless Personal Communications, 2017
“University of Macau | The only public comprehensive university in Macauâ€, Um.edu.mo, 2018. [Online]. Available: http://www.um.edu.mo/. [Accessed:17-Dec-2018].
“CRISES/URVâ€, Crises-deim.urv.cat, 2018. [Online]. Available: https://crises-deim.urv.cat/web/. [Accssesd: 17-Dec-2018].
“OPUS: Zur Startseiteâ€, Elib.uni-stuttgart.de, 2018. [Online]. Available: https://elib.umi-stuttgart.de/. [Accessed: 17-Dec 2018].
“Home – Springerâ€, Link.springer.com, 2018. [Online]. Available: https://link.springer.com/. [Accessed: 17-Dec-2018].
“Inria – Accueilâ€, Hal.inria.fr, 2018. [Online]. Available: https://hal.inria.fr/. [Accessed: 17-Dec-2018].
“Computer Communication Review | acm sigcomm", Sigcomm.org, 2018. [Online]. Available: http://www.sigcomm.org/publications/computer-communication-review. [Accessed: 17-Dec-2018].
“CORA Homeâ€, Cora.ucc.ie, 2018. [Online]. Available: https://cora.ucc.ie/. [Accessed: 17- Dec- 2018].
“INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGIESâ€, Ijcsit.com, 2018. [Online]. Available: 2018].
2018. [Online]. Available: https://downloads.cloudsecurityalliance.org/. [Accessed: 17-Dec-2018].
“PoPETs/PETSâ€, Petsymposium.org, 2018. [Online]. Available: https:// petsymposium.org/. [Accessed: 17- Dec- 2018].
“IJARCCE - A Monthly Peer-reviewed Online Journalsâ€, IJARCCE, 2018. [Online]. Available: https:// ijarcce.com/. [Accessed: 17-Dec-2018].
“CryptoWiki", Cryptowiki.net, 2018. [Online]. Available: http://cryptowiki.net/index.php?title=Main_Page. [Accessed: 17-Dec-2018].