Title :
Query privacy in pervasive computing
Author :
Liu, Heng ; Wang, Tiejun ; Zhou, Mingtian ; Sun, Ming ; Liu, Zhen
Author_Institution :
School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China
Abstract :
With advance in wireless and location technology, Location-Based Services (LBSs) become the main applications in pervasive environment. Privacy of user query is becoming an increasingly important issue. In our proposed technique, user´s point location has been expanded to region location. Because LBSs can´t distinguish the true user from the other users in same region, user query privacy is protected. This paper has analyzed the problems that exist in the protecting of query privacy in pervasive computing. On this basis, a double threshold privacy model based on user distribution matrix is proposed for protecting user query privacy, include query location privacy and query content privacy. In this paper, we present a user cloaking algorithm to dynamic generation and modification user cloaking region. Experimental results validate the efficiency and effective of proposed technique.
Keywords :
Computational modeling; Heuristic algorithms; Mobile communication; Optical character recognition software; Pervasive computing; Privacy; Sun; location privacy; location-based services; pervasive computing; query privacy;
Conference_Titel :
Information Science and Engineering (ICISE), 2010 2nd International Conference on
Conference_Location :
Hangzhou, China
Print_ISBN :
978-1-4244-7616-9
DOI :
10.1109/ICISE.2010.5688551