Protecting location privacy in Augmented Reality using k-anonymization and pseudo-id

Location based services (LBS) are one of the most commonly used services in Augmented Reality(AR). In LBS, the safety and security of data is one of the most important things to be taken care. A privacy-aware management of location information, which provides location privacy for clients against vulnerabilities or abuse, is very much needed. This paper discusses how to protect the location privacy from various privacy threats, which occurred because of the unlimited usage of LBS, by a scalable architecture. We have developed an efficient LBS privacy protection algorithm. In our model, k-anonymization and pseudo-anonymization methods have been used hand in hand. The proposed location privacy frame work is implemented by an efficient TTP server. We have studied the efficiency of our algorithm under different conditions using realistic workloads. Our experiment shows that the k-anonymization and the pseudo-anonymization methods used together in our algorithm provide an efficient location privacy.

[1]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[2]  Marco Gruteser,et al.  USENIX Association , 1992 .

[3]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[4]  Arnaud Sahuguet,et al.  Enter Once, Share Everywhere: User Profile Management in Converged Networks , 2003, CIDR.

[5]  Yael Gertner,et al.  Oblivious Transfer , 1997 .

[6]  Ben Blachnitzky,et al.  Augmented reality , 2012, 2012 IEEE Hot Chips 24 Symposium (HCS).

[7]  Aziz Mohaisen,et al.  Privacy in Location Based Services: Primitives Toward the Solution , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.

[8]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[9]  Hans-Peter Kriegel,et al.  The R*-tree: an efficient and robust access method for points and rectangles , 1990, SIGMOD '90.

[10]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[11]  Bjorn Ekengren,et al.  Mobile Augmented Reality , 2010 .