A Security Framework of Group Location-Based Mobile Applications in Cloud Computing

In this paper, we present a secure frame-work when the location information of mobile terminals is utilized in a cloud computing environment. Because cloud computing provides powerful storage capability and scalability, many application providers start migrating the data stored in their original databases to outsourced databases (ODB), such as AMAZONSIMPLEDB. However, because of the multiple tenants and multiple replicas of data in the cloud databases, the security issues of location-based services (LBS)become more serious in cloud computing. In this paper, we propose a security model for LBS using ODB and demonstrate how we can use distributed storage and international mobile subscriber identity (IMSI) as user identification to secure the location data. Enhanced privacy and authentication mechanisms on top of the suggested security framework are also proposed, which achieve significant improvements in privacy, authentication, and continuity when providing LBS in cloud computing. Simulation results show that network coding scheme has better performance than hash function scheme.

[1]  Muriel Médard,et al.  Trusted Storage over Untrusted Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[2]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[3]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[4]  Robert P. Minch,et al.  Privacy issues in location-aware mobile devices , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[5]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[6]  Marco Gruteser,et al.  USENIX Association , 1992 .

[7]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[8]  Wenjing Lou,et al.  Security, privacy, and accountability in wireless access networks , 2009, IEEE Wireless Communications.

[9]  Anind K. Dey,et al.  Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns , 2003, INTERACT.

[10]  Pierangela Samarati,et al.  Location privacy in pervasive computing , 2008 .

[11]  Hakan Hacigümüs,et al.  Providing database as a service , 2002, Proceedings 18th International Conference on Data Engineering.