Securing location privacy in Augmented Reality

In Augmented Reality (AR), users main concern includes privacy and safety of data. Since location based services (LBS) are one of the major applications of the AR, it is important to have a privacy-aware management of location information, providing location privacy for clients against vulnerabilities or abuse. This paper discusses how to protect the location privacy from various privacy threats, which occurred because of the unlimited usage of LBS, by a scalable architecture. We have developed an efficient LBS privacy protection algorithm. In our model, k-anonymization and pseudo-anonymization methods are used hand in hand. The proposed location privacy frame work is implemented by an efficient trusted third party server. We have studied the efficiency of our algorithm under different conditions using realistic work loads. Our experiment shows that the k-anonymization and the pseudo-anonymization methods used together in our algorithm provide an efficient location privacy.

[1]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[2]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[3]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[4]  Marco Gruteser,et al.  USENIX Association , 1992 .

[5]  Arnaud Sahuguet,et al.  Enter Once, Share Everywhere: User Profile Management in Converged Networks , 2003, CIDR.

[6]  Yael Gertner,et al.  Oblivious Transfer , 1997 .

[7]  SchmalstiegDieter,et al.  Mobile Augmented Reality , 2011 .

[8]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[9]  Ben Blachnitzky,et al.  Augmented reality , 2012, 2012 IEEE Hot Chips 24 Symposium (HCS).

[10]  Aziz Mohaisen,et al.  Privacy in Location Based Services: Primitives Toward the Solution , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.

[11]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[12]  Hans-Peter Kriegel,et al.  The R*-tree: an efficient and robust access method for points and rectangles , 1990, SIGMOD '90.

[13]  Bjorn Ekengren,et al.  Mobile Augmented Reality , 2010 .