Abstract

AbstractThe widespread use of location-based services (LBS), in which any informative service is provided simply based on the user's present location, has generated serious concerns about the user's location privacy. For example, if a customer wants to know “where is the nearest ATM machine?”, she must provide her exact geographical coordinates in order to receive the location-based informative services she requested. Although location-based services open up a wide range of markets and give remarkable convenience to the end user, they also bring minor privacy threats to the user's location data. The requirement that the user informs the LBS provider of their current location in order to get connected services exposes the system to a risk of privacy invasion. Because the volume of data collected from moving or stationary mobile users utilizing LBS may be large, it is critical to design safe frameworks and systems that keep location information private. The two most common techniques to preserving location privacy in LBS are cloaking and obfuscation. These solutions leverage a trusted third party (TTP) and the K-anonymity principle to make the query issuer indistinguishable from other K 1 additional users. The thesis's initial goal is to investigate the user privacy concerns raised by location-based services, and it presents the VIC-PRO scheme, a TTP-based technique to avoid location-based proximity inference of the user who submits a query. The proposed VIC-PRO technique enhances the privacy of query initiating proximity information and helps to close the holes in the present system's K-anonymity approach. In TTP-based methods, all data (namely location coordinates and query) is available at the central server; hence, the central node has complete awareness of the query (including user ID). This is a fundamental flaw in TTP-based design, and it renders these frameworks vulnerable to various privacy assaults. We observe the need for collaboration-based communication between peer users who belong to the population of mobile users in a decentralized or TTP-free architecture and propose CAST (acronym for CAching with truST), a collaborative P2P communication model employing a cascading series of trust between peers, where peers use cached data to collaborate with one another and the results can be obtained. The method operates effectively and gives results locally with little latency when the peers have similar interests (or data value). Under a pull-based sporadic query situation, the suggested algorithm prioritizes user privacy and performs well. We utilize the benefits and mitigate the flaws of both traditional current techniques since measuring and evaluating peer trust have always been a vital aspect. We offer HYB, a hybrid approach, for achieving location privacy for mobile users that regularly utilize location services. The proposed HYB method is based on collaborative location data preprocessing and makes use of homomorphic encryption techniques. Location privacy may be accomplished on two levels: close proximity and far distance. Under a particular, pull-based, occasional query situation, the suggested privacy algorithms successfully safeguard user location privacy. The privacy issue becomes critical when location-tagged data publications, such as public healthcare data and regional criminal history data, are constructed in reverse order by a challenger to locate the authentic consumer against the location specified in the specific record tuple. In most circumstances, address information is regarded as one of the most sensitive aspects of the public record. Any association of such data with a publicly released identifier that has quasi-property has the potential to reveal a great regarding a user (that would normally remain concealed) or, in the worst-case scenario, ruin the user's social reputation. We determine the current situation in geospatial masking, undertake a thorough study of current masking approaches, as well as design three-layer iterative RDV masking, a viable technique that gives location secrecy without rendering publicly available data useless. The recommended approach is excellent for geo-referenced, consistent, granular point published data.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call