摘要(英) |
Nowadays, mobile devices are commonly embedded with GPS, such as cell phones, PDAs, and Tablet PCs. This allows people carrying in these mobile devices to enjoy the convenience of location-based services. In LBSs, a user commonly sends its own location to query for POIs. However, the privacy of the location information is very important. If a user whereabout is monitored continuously, his/her activities can be easily inferred. To avoid the exposure of the user’s activity, the location information should be protected in location-based services.
The concept of cloaking has been introduced to protect the user’s location information. In cloaking system, an area containing the user’s location is sent to the server for query instead of the user’s true location. However, the traditional cloaking systems suffer from correlation attacks. By observing the traffic of the cloaking region, an adversary can eventually identify a particular client. To provide better location privacy protection, in this thesis we introduce the spy-based cloaking system. In our system, a number of spies are used as the disguise to protect the true identity of the client. The simulation results show that, albeit the higher communication overhead, the proposed spy-based cloaking system is able to provide a much stronger location information privacy protection against correlation attacks. |
參考文獻 |
[1] Foxs News. Man Accused of Stalking Ex-Girlfriend With GPS. http://www.foxnews.com/story/0,2933,131487,00.html. Sep 04, 2004.
[2] Mike Spreitzer and Marvin Theimer. Providing location information in a ubiquitous computing environment (panel session). In Proceedings of the fourteenth ACM symposium on Operating systems principles, pages 270V 283. ACM Press, 1993.
[3] Andy Harter, Andy Hopper, Pete Steggles, Andy Ward, and Paul Webster. The anatomy of a context-aware application. In Mobile Computing and Networking, pages 59V68, 1999.
[4] Rui Jose and Nigel Davies. Scalable and flexible locationbased services for ubiquitous information access. In Proceedings of First International Symposium on Handheld
and Ubiquitous Computing, HUC99, pages 52V66. Springer Verlag, 1999.
[5] C. Bisdikian, J. Christensen, J. Davis II, M. Ebling, G. Hunt, W. Jerome, H. Lei, and S. Maes. Enabling location-based applications. In 1st Workshop on Mobile commerce, 2001.
[6] D. Chaum. Untraceable electronic mail, return addresses,and digital pseudonyms. Communications of the ACM, 4(2), February 1981.
[7] D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM (USA), 42(2):39V41, 1999.
[8] M. Reiter and A. Rubin. Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security, 1(1):66V92, June 1998.
[9] A. R. Beresford and F. Stajano. Location privacy in pervasive computing. IEEE Pervasive Computing, 2(1):46V55, 2003.
[10] M. Gruteser and D. Grunwald, Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, in USENIX MobiSys, pp. 31V42, 2003.
[11] M. F. Mokbel, C.-Y. Chow, and W. G. Aref, The New Casper: Query Processing for Location Services without Compromising Privacy, in VLDB, pp. 763V774, 2006.
[12] P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, Preventing Location-Based Identity Inference in Anonymous Spatial Queries, IEEE TKDE, to appear.
[13] B. Gedik and L. Liu, Location Privacy in Mobile Systems: A Personalized Anonymization Model, in ICDCS, pp. 620V629, 2005.
[14] Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: WCNC, pp. 1187V1192 (2005)
[15] T. Xu, Y. Cai. Location cloaking for safety protection of ad hoc networks, in: Proceedings of IEEE INFOCOM09, Rio de Janeiro, Brazil, 2009.
[16] H. Kido, Y. Yanagisawa, and T. Satoh, An Anonymous Communication Technique using Dummies for Location-based Services, in IEEE International Conference on Pervasive Services, p. 1248, 2005.
[17] C.-Y. Chow, M. F. Mokbel, and X. Liu, A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services, in GIS, pp. 171V 178, 2006.
[18] G. Ghinita, P. Kalnis, and S. Skiadopoulos, PRIV E: Anonymous Location-Based Queries in Distributed Mobile Systems, in WWW, pp. 371V380, 2007.
[19] G. Ghinita and P. Kalnis and S. Skiadopoulos, MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries, in SSTD, pp. 758V769, 2007.
[20] P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, 1998.
[21] http://www.netlab.tkk.fi/ esa/java/rwp/rwp-model.shtml |