• DocumentCode
    233209
  • Title

    User Location Anonymization Based on Secret Computation

  • Author

    Sato, F.

  • Author_Institution
    Dept. of Inf. Sci., Toho Univ., Funabashi, Japan
  • fYear
    2014
  • fDate
    8-10 Nov. 2014
  • Firstpage
    410
  • Lastpage
    415
  • Abstract
    Recently, highly accurate positioning devices enable us to provide various types of location based services (LBS). Since location information may reveal private information, preserving location privacy has become a significant issue in LBS. Lots of different techniques for securing the location privacy have been proposed, for instance the concept of Silent period, the concept of Dummy node, and the concept of Cloaking-region. However, many of these were not focused on information leakage on the servers. In this paper, we propose a user location management method based on the secure computation algorithm which protects information leakage from the location management servers. This algorithm is based on the multi-party computation and the computation complexity is not so high. We evaluated the proposed scheme in comparison with the method based on the homomorphic cryptographic method.
  • Keywords
    cryptography; data privacy; cloaking-region; computation complexity; dummy node; homomorphic cryptographic method; location based services; location privacy; secure computation algorithm; silent period; user location anonymization; user location management method; Encryption; Mobile communication; Privacy; Quality of service; Registers; Servers; location anonymization; location based services; location privacy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Broadband and Wireless Computing, Communication and Applications (BWCCA), 2014 Ninth International Conference on
  • Conference_Location
    Guangdong
  • Print_ISBN
    978-1-4799-4174-2
  • Type

    conf

  • DOI
    10.1109/BWCCA.2014.96
  • Filename
    7016106