scispace - formally typeset
Proceedings ArticleDOI

Survey and Review of Location Privacy Techniques in Location Based Services

Reads0
Chats0
TLDR
This paper presents the review and proposes the enhanced mechanisms to protect the location privacy of mobile users and the parameters of importance which should be the objectives of research while providing the location based services.
Abstract
With the recent advancement in the mobile technology, devices are equipped with location computing facility. Devices are mounted with real entities such as human, animals, vehicles etc. In Location Based Services, user carrying device seeks service and hence user's location information is compromised and can be misused by service providers. In this paper, we present the review and propose the enhanced mechanisms to protect the location privacy of mobile users. It necessary to observe that to get quality of service, user needs to send precise location, while to protect privacy, we need to have balanced view regarding revealing location to service provider. Quality of service, Performance, Energy consumption, Network bandwidth consumption and Privacy strength are the parameters of importance which should be the objectives of research while providing the location based services.

read more

Citations
More filters
Journal ArticleDOI

Privacy-preserving location-based service protocols with flexible access

TL;DR: This proposal gives refined data classification and uses generalised ElGamal to support flexible access to different data classes and makes use of pseudo-random function (PRF) to protect users' position query.
Proceedings ArticleDOI

Enhancing the Privacy Protection in Locations-based Services through Hybrid LSTM

TL;DR: In this article , a systematic survey is performed over the various methods present so far for privacy protection in location-based services, and several possible attacks in LBS are also discussed in this paper.
References
More filters
Journal ArticleDOI

Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms

TL;DR: A scalable architecture for protecting the location privacy from various privacy threats resulting from uncontrolled usage of LBSs is described, including the development of a personalized location anonymization model and a suite of location perturbation algorithms.
Journal ArticleDOI

A survey of computational location privacy

TL;DR: This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information, which includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data.
Proceedings ArticleDOI

Toward a distributed k-anonymity protocol for location privacy

TL;DR: The evaluation of the sample implementation shows that the distributed k-anonymity protocol is sufficiently fast to be practical and integrates well with existing infrastructures for location-based services, as opposed to the previous research.
Proceedings ArticleDOI

A distributed k-anonymity protocol for location privacy

TL;DR: The evaluation of the sample implementation shows that the distributed k-anonymity protocol is sufficiently fast to be practical and integrates well with existing infrastructures for location-based services, as opposed to the previous research.
Journal ArticleDOI

Don't trust anyone: Privacy protection for location-based services

TL;DR: This work proposes efficient algorithms for users to compute a k-anonymous imprecise location and to randomly select one of her peers with uniform probability who forwards the service request on behalf of the user.
Related Papers (5)