LOCATION BASED QUERIES FOR CONTENT PROTECTING IN PRIVACY PRESERVING
AbstractMobile devices with global positioning capabilities allow users to retrieve points of interest in their proximity. To protect user privacy, it is important not to disclose exact user coordinates to un-trusted entities that provide location-based services. Currently, there are two main approaches to protect the location privacy of users: hiding locations inside cloaking regions and encrypting location data using private information retrieval protocols. Previous work focused on finding good trade-offs between privacy and performance of user protection techniques, but disregarded the important issue of protecting the POI dataset. It is very easy for a person to know his/her location with the help of devices having GPS facility. When userâ€™s location is provided to LBS, it is possible to user to know all location dependent information like location of friends or Nearest Restaurant, whether or traffic conditions. The massive use of mobile devices pave the way for the creation of wireless networks that can be used to exchange information based on locations. When the exchange of location information is done amongst entrusted parties, the privacy of the user could be in harmful. Existing protocol doesnâ€™t work on many different mobile devices and another issue is that, Location Server (LS) should provide misleading data to user. Privacy preserving reputation techniques provides a suitable approach to address such problem. They can be easily integrated into our methods.
C. Aguilar-Melchor and P. Gaborit. A lattice-based computationally-efficient private information retrieval protocol. Cryptology ePrint Archive, Report 2007/446, 2007.
H. S.-M. Ali Khoshgozaran and C. Shahabi. SPIRAL, a scalable private information retrieval approach to location privacy. In Proceedings of the 2nd International Workshop on Privacy-Aware Location based Mobile Services (PALMS), 2008.
. B. Bamba, L. Liu, P. Pesti, and T. Wang. Supporting anonymous location queries in mobile environments with privacy grid. In Proceeding of the 17th international conference on World Wide Web, pages 237â€“246, New York, NY, USA, 2008.
. A. Beimel and Y. Stahl. Robust information-theoretic private information retrieval. J. Cryptol., 20(3):295â€“321, 2007.
The submitter hereby warrants that the Work (collectively, the “Materials”) is original and that he/she is the author of the Materials. To the extent the Materials incorporate text passages, figures, data or other material from the works of others, the undersigned has obtained any necessary permissions. Where necessary, the undersigned has obtained all third party permissions and consents to grant the license above and has all copies of such permissions and consents.
The submitter represents that he/she has the power and authority to make and execute this assignment. The submitter agrees to indemnify and hold harmless the COMPUSOFT from any damage or expense that may arise in the event of a breach of any of the warranties set forth above. For authenticity, validity and originality of the research paper the author/authors will be totally responsible.