2,484 Hits in 3.1 sec

A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks [chapter]

Marco Gruteser, Dirk Grunwald
2004 Lecture Notes in Computer Science  
In a case study, we apply the approach to IEEE 802.11b wireless LAN networks and location-based services, where it reveals significant location privacy concerns through link-and application-layer information  ...  Current research addresses location privacy rather patchwork-like than comprehensively.  ...  Watson Research Center encouraged me to research location privacy challenges. The anonymous referees provided useful comments on a draft of this paper.  ... 
doi:10.1007/978-3-540-39881-3_5 fatcat:4hy6lvhgz5gzpkk6mfmiygdnju

A Review of Privacy Preserving LBS: Study of Well-Suited Approaches

Neeta B. Bhongade, S.B Sarkar
2015 International Journal of Engineering Trends and Technoloy  
By knowing the location of mobile user, Service Provider can offer more enhanced services and applications to the mobile user.  ...  All the Current researches in Location Based Services(LBS) highlights the privacy requirements and presents the approaches to meet the requirements.  ...  untrusted service providers, hence coining the term location privacy.  ... 
doi:10.14445/22315381/ijett-v19p212 fatcat:fsyorvye4ffcnmhnqzavd3cbky

Wireless location privacy protection

B. Schilit, J. Hong, M. Gruteser
2003 Computer  
Location-based services are emerging as the next killer app in personal wireless devices, but there are few safeguards on location privacy.  ...  In this way, the untrusted service cannot easily map the reported location back to an individual vehicle.  ... 
doi:10.1109/mc.2003.1250896 fatcat:thi4pojojncnfjwfpsr7ljzrci

STAMP: Enabling Location Privacy for Mobile Users While Using Public Wi-Fi

Navya Davis
2018 International Journal for Research in Applied Science and Engineering Technology  
It ensures integrity and non-transferability as well as protecting user's privacy.  ...  Today location based services are becoming more popular. Majority of the applications are based on user's current location. So there may be some malicious users rely on that application.  ...  There is a statistically changed pseudonym to protect the location privacy from each other and from untrusted location proof server.  ... 
doi:10.22214/ijraset.2018.3129 fatcat:mxrseac2tvdjhle6gzyd4arj4y

Secrecy Preserving In a Location Proof Updating System

Babasaheb A. Waghmode
2015 International Journal of Innovative Research in Computer and Communication Engineering  
The Location Based Services personalize the services they provide or grant access to resources according to the present locations of users.  ...  In most of current schemes, the location of users or devices are determined by the device through GPS and forwarded to the Location Based Service provider.  ...  More explicitly, we use statistically updated pseudonyms at every mobile device to protect their location secrecy from each other, and also from the untrusted location proof server.  ... 
doi:10.15680/ijircce.2015.0307021 fatcat:2cbbexe7lzbcjoinjrmvq2hkpi

Challenges of Privacy-aware Localization on Wearable Devices

Viktoriia Shubina, Aleksandr Ometov, Dragos Niculescu, Elena-Simona Lohan
2019 Zenodo  
The authors gratefully acknowledge funding from European Union's Horizon 2020 Research and Innovation programme under the Marie Sklodowska Curie grant agreement No. 813278 (A- WEAR,  ...  Acknowledgements The authors gratefully acknowledge funding from European Union's Horizon 2020 Research and Innovation programme under the Marie Sklodowska Curie grant agreement No. 813278 (A-WEAR, http  ...  The service provider related to location is the Location Solution Provider (LSP), namely the provider of the actual location technology (e.g., Google, HERE technologies) and the Location-Based Service  ... 
doi:10.5281/zenodo.3522084 fatcat:72l77kf7ejgulcaa2xsdxwq5fu

Protecting Consumer Data in Composite Web Services [chapter]

Craig Pearce, Peter Bertok, Ron Van Schyndel
2005 IFIP Advances in Information and Communication Technology  
The system extends to support protection of customer privacy when multiple vendors interact in composite web services.  ...  We propose a service-oriented technically enforceable system that preserves privacy and security for customers transacting with untrusted online vendors.  ...  ACKNOWLEDGEMENTS We would like to thank Formal Systems for providing a license to freely use FDR2. We would also like to thank the anonymous reviewers for their useful suggestions.  ... 
doi:10.1007/0-387-25660-1_2 fatcat:tovljzmvtbgwrcbvhfe7kobpoy

Privacy Challenges in Third-Party Location Services

Maria Luisa Damiani, Colette Cuijpers
2013 2013 IEEE 14th International Conference on Mobile Data Management  
The first focuses on the compliance of emerging location services standards with European data protection norms; the latter focuses on hard privacy solutions protecting from untrusted location providers  ...  This raises novel privacy concerns. In this paper, we discuss two issues related to the protection from location providers.  ...  A large body of literature on location privacy focuses on privacy protection from untrusted application providers, e.g. a honest-but-curious LBS provider can take advantage of the location information  ... 
doi:10.1109/mdm.2013.67 dblp:conf/mdm/DamianiC13 fatcat:jeiv5p5i4zgilnwaojfjuatb3i

Privacy Preservation over Untrusted Mobile Networks [chapter]

Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou
2009 Lecture Notes in Computer Science  
In this chapter, we first present a survey of existing state-of-the-art protection mechanisms and their challenges when deployed in the context of wired and wireless networks.  ...  The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile network operators.  ...  Basic Scenario Already noted, previously proposed privacy protection systems mostly focused on protecting sender, receiver, or communication anonymity from untrusted servers and observers.  ... 
doi:10.1007/978-3-642-03511-1_4 fatcat:4hmvrqmdczhtxeon67bkmjtvgy

A Survey on Preserving State of Location Privacy in Geo Social Application

2015 International Journal of Innovative Research in Computer and Communication Engineering  
So an added privacy must be provided in order to preserve the location of the users.  ...  In this paper we comparethe different location privacy settings that can be introduced in geo social applications and different methods that are now adopted to provide security to the users.  ...  Managing privacy in the network is one of the most challenging aspects of wireless location privacy.  ... 
doi:10.15680/ijircce.2015.0301016 fatcat:a67c4jv7afcldae74pm3arep2a

Software security and privacy risks in mobile e-commerce

Anup K. Ghosh, Tara M. Swaminatha
2001 Communications of the ACM  
Wireless devices provide users mobility to research, communicate, and purchase goods and services from anywhere at anytime without being tethered to the desktop.  ...  Using the Internet from wireless devices has come to be known as mobile e-commerce, or simply "m-commerce," and encompasses many more activities than merely online purchasing.  ...  For instance, Java provides type safety, memory protection, and sandboxing for untrusted content.  ... 
doi:10.1145/359205.359227 fatcat:ru4x4rgohrblrfi254yzfgaada

Providing Users' Anonymity in Mobile Hybrid Networks

Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou
2013 ACM Transactions on Internet Technology  
The resulting architecture protects users' privacy and offers data integrity and accountability.  ...  In current mobile systems, users gain access to remote service providers over mobile network operators.  ...  The current privacy protection systems are focused on preserving users from untrusted service providers. However, at the same time, it is assumed that mobile network operators are trusted.  ... 
doi:10.1145/2461321.2461322 fatcat:svbdssa32ndd5gxx7w74pchnyi

Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN's and Mobile Devices

P. Sanyasi, Jagadish Gurrala
2016 International Journal of Computer Applications  
We have been study how users share their location in real world, we collected traces from a commercial LBS services operated by a startup company.  ...  This paper leaves several ideas for researchers to mitigate issues in location privacy and authentication areas for better future.  ...  Wireless LAN networks pose especially serious location privacy threats for the following reasons: 1. 1.Untrusted network operators.  ... 
doi:10.5120/ijca2016910829 fatcat:ap66hq3osbbmliupalivw3mivm

Security and Privacy Issues for Connected Vehicles [article]

Wenjun Xiong, Robert Lagerström
2018 arXiv   pre-print
with a special focus on the privacy aspect.  ...  However, the privacy issues of vehicular data have not been addressed.  ...  Vehicular Data Privacy In order to analyze and protect vehicular data, We classify vehicular data into four data types (shown in Table 1 ). 2) Location-based services provided by portable navigation devices  ... 
arXiv:1812.04967v2 fatcat:jg2lf6ezarcr3epjfou46m3ley

A Survey of System Architectures, Privacy Preservation, and Main Research Challenges on Location-Based Services

2019 KSII Transactions on Internet and Information Systems  
Although LBS application provides great benefits to mobile users, it also raises a sever privacy concern of users due to the untrusted service providers.  ...  Therefore, there is a growing interest in protecting the user's location privacy and private information from malicious attackers when using LBSs and media tag services.  ...  In location-aware smart mobile devices, it has become inevitable to protect the privacy assets of users from malicious attackers or untrusted-service providers for the maturation of a healthy LBS ecosystem  ... 
doi:10.3837/tiis.2019.06.024 fatcat:io2zsbg2nzdpzjo4ai3oiztypy
« Previous Showing results 1 — 15 out of 2,484 results