DocumentCode
233209
Title
User Location Anonymization Based on Secret Computation
Author
Sato, F.
Author_Institution
Dept. of Inf. Sci., Toho Univ., Funabashi, Japan
fYear
2014
fDate
8-10 Nov. 2014
Firstpage
410
Lastpage
415
Abstract
Recently, highly accurate positioning devices enable us to provide various types of location based services (LBS). Since location information may reveal private information, preserving location privacy has become a significant issue in LBS. Lots of different techniques for securing the location privacy have been proposed, for instance the concept of Silent period, the concept of Dummy node, and the concept of Cloaking-region. However, many of these were not focused on information leakage on the servers. In this paper, we propose a user location management method based on the secure computation algorithm which protects information leakage from the location management servers. This algorithm is based on the multi-party computation and the computation complexity is not so high. We evaluated the proposed scheme in comparison with the method based on the homomorphic cryptographic method.
Keywords
cryptography; data privacy; cloaking-region; computation complexity; dummy node; homomorphic cryptographic method; location based services; location privacy; secure computation algorithm; silent period; user location anonymization; user location management method; Encryption; Mobile communication; Privacy; Quality of service; Registers; Servers; location anonymization; location based services; location privacy;
fLanguage
English
Publisher
ieee
Conference_Titel
Broadband and Wireless Computing, Communication and Applications (BWCCA), 2014 Ninth International Conference on
Conference_Location
Guangdong
Print_ISBN
978-1-4799-4174-2
Type
conf
DOI
10.1109/BWCCA.2014.96
Filename
7016106
Link To Document