Preserving User Location Privacy in Era of Location-Based Services: Challenges, Techniques and Framework

The technological advancements of mobile networks, devices, global position technology and sensors, have lead to a plethora of location-based services (LBSs) which is being offered to user. In the modern digital age, most of the automobiles use location sensing technologies and the mobile devices are equipped with GPS location tracking. In spite of the numerous potential benefits of location-based services, location awareness poses some foreseeable threats, the most important of which is location privacy. A single piece of information about location can reveal a lot about user, such as ‘who’, ‘what’, ‘when’ and ‘where’ someone is. This paper presents a comprehensive review of various aspects related to location privacy. An attempt has been made to introduce a framework to balance the trade-offs between privacy and security. The proposed framework uses privacy mechanism to protect individual’s sensitive data, and a role-based access control technique to provide security of collected data through authorized user.

[1]  Chien-Chung Shen,et al.  Location-enhanced authenticated key exchange , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).

[2]  Ernesto Damiani,et al.  Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.

[3]  Lan Huang,et al.  An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints , 2017, Secur. Commun. Networks.

[4]  Marco Gruteser,et al.  USENIX Association , 1992 .

[5]  Frank Dürr,et al.  A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.

[6]  Mani B. Srivastava,et al.  A framework for context-aware privacy of sensor data on mobile systems , 2013, HotMobile '13.

[7]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[8]  Asim Smailagic,et al.  Location sensing and privacy in a context-aware computing environment , 2002, IEEE Wirel. Commun..

[9]  Frank Dürr,et al.  Position sharing for location privacy in non-trusted systems , 2011, PerCom.

[10]  Sheng Zhong,et al.  Anonymity-preserving data collection , 2005, KDD '05.

[11]  Marco Gruteser,et al.  Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[12]  Sheikh Iqbal Ahamed,et al.  A privacy preserving framework for RFID based healthcare systems , 2017, Future Gener. Comput. Syst..

[13]  Sangjin Lee,et al.  Detection and Response of Identity Theft within a Company Utilizing Location Information , 2016, 2016 International Conference on Platform Technology and Service (PlatCon).

[14]  Ben Y. Zhao,et al.  Preserving Location Privacy in Geosocial Applications , 2014, IEEE Transactions on Mobile Computing.

[15]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[16]  Christian S. Jensen,et al.  Indexing the Positions of Continuously Moving Objects , 2000, SIGMOD Conference.

[17]  Traian Marius Truta,et al.  Protection : p-Sensitive k-Anonymity Property , 2006 .

[18]  Helen J. Wang,et al.  Preserving location privacy in wireless lans , 2007, MobiSys '07.

[19]  Carlo Ratti,et al.  Real-Time Urban Monitoring Using Cell Phones: A Case Study in Rome , 2011, IEEE Transactions on Intelligent Transportation Systems.

[20]  Nino Vincenzo Verde,et al.  Using classification for role-based access control management , 2016 .