scholarly journals LBS privacy protection technology based on searchable encryption mechanism

2018 ◽  
Vol 189 ◽  
pp. 10013
Author(s):  
Tao Feng ◽  
Xudong Wang ◽  
Xinghua Li

Location based Service (the Location - -based Service, LBS) is a System is to transform the existing mobile communication network, wireless sensor networks, and Global Positioning System (Global Positioning System, GPS) with the combination of information Service mode, the general improvement in Positioning technology and the high popularity of mobile intelligent terminals, led to the growing market of LBS. This article from the perspective of LBS service privacy security, mainly studies the LBS location privacy protection scheme based on cipher text search, in LBS service location privacy and search information privacy issues, focus on to design the scheme, based on the cryptography in LBS service privacy protection issues in the process, this paper fully and secret cipher text search characteristics, design a new privacy protection of LBS service model, and expounds the system structure and working principle of model, defines the security properties of the privacy protection model and security model, Under the specific security assumptions, the new location privacy protection scheme based on lbspp-bse (LBS location privacy protection based on searchable encryption) is implemented.

2019 ◽  
Vol 28 (09) ◽  
pp. 1950147
Author(s):  
Lei Zhang ◽  
Jing Li ◽  
Songtao Yang ◽  
Yi Liu ◽  
Xu Zhang ◽  
...  

The query probability of a location which the user utilizes to request location-based service (LBS) can be used as background knowledge to infer the real location, and then the adversary may invade the privacy of this user. In order to cope with this type of attack, several algorithms had provided query probability anonymity for location privacy protection. However, these algorithms are all efficient just for snapshot query, and simply applying them in the continuous query may bring hazards. Especially that, continuous anonymous locations which provide query probability anonymity in continuous anonymity are incapable of being linked into anonymous trajectories, and then the adversary can identify the real trajectory as well as the real location of each query. In this paper, the query probability anonymity and anonymous locations linkable are considered simultaneously, then based on the Markov prediction, we provide an anonymous location prediction scheme. This scheme can cope with the shortage of the existing algorithms of query probability anonymity in continuous anonymity locations difficult to be linked, and provide query probability anonymity service for the whole process of continuous query, so this scheme can be used to resist the attack of both of statistical attack as well as the infer attack of the linkable. At last, in order to demonstrate the capability of privacy protection in continuous query and the efficiency of algorithm execution, this paper utilizes the security analysis and experimental evaluation to further confirm the performance, and then the process of mathematical proof as well as experimental results are shown.


2019 ◽  
Vol 148 ◽  
pp. 142-150 ◽  
Author(s):  
Hao Wang ◽  
Guangjie Han ◽  
Lina Zhou ◽  
James Adu Ansere ◽  
Wenbo Zhang

Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2074 ◽  
Author(s):  
Qiuhua Wang ◽  
Jiacheng Zhan ◽  
Xiaoqin Ouyang ◽  
Yizhi Ren

Wireless Sensor Networks (WSNs) have been widely deployed to monitor valuable objects. In these applications, the sensor node senses the existence of objects and transmitting data packets to the sink node (SN) in a multi hop fashion. The SN is a powerful node with high performance and is used to collect all the information sensed by the sensor nodes. Due to the open nature of the wireless medium, it is easy for an adversary to trace back along the routing path of the packets and get the location of the source node. Once adversaries have got the source node location, they can capture the monitored targets. Thus, it is important to protect the source node location privacy in WSNs. Many methods have been proposed to deal with this source location privacy protection problem, and most of them provide routing path diversity by using phantom node (PN) which is a fake source node used to entice the adversaries away from the actual source node. But in the existing schemes, the PN is determined by the source node via flooding, which not only consumes a lot of communication overhead, but also shortens the safety period of the source node. In view of the above problems, we propose two new grid-based source location privacy protection schemes in WSNs called grid-based single phantom node source location privacy protection scheme (SPS) and grid-based dual phantom node source location privacy protection scheme (DPS) in this paper. Different from the idea of determining the phantom node by the source node in the existing schemes, we propose to use powerful sink node to help the source node to determine the phantom node candidate set (PNCS), from which the source node randomly selects a phantom node acting as a fake source node. We evaluate our schemes through theoretical analysis and experiments. Experimental results show that compared with other schemes, our proposed schemes are more efficient and achieves higher security, as well as keeping lower total energy consumption. Our proposed schemes can protect the location privacy of the source node even in resource-constrained wireless network environments.


Teknika ◽  
2014 ◽  
Vol 3 (1) ◽  
pp. 11-19
Author(s):  
Kathryn Widhiyanti ◽  
Anggya N.D. Soetarmono

Jurnal berikut menyajikan implementasi dari Global Positioning System (GPS) dan Google Cloud Messaging (GCM) pada Sistem Sales Force Management (SFM). Global Positioning System(GPS) yang selama ini digunakan sebagai penunjuk arah, dapat diterapkan untuk sebuah perusahaan dalam melakukan pelacakan pekerja lapanganannya. Koordinat GPS dapat menjadi media informasi yang mudah diakses dan cukup akurat dalam penggunaannya. Dalam tugas akhir ini diterapkan penggunaan GPS dalam sistem absensi kunjungan salesman ke toko. GPS diimplementasikan didalam program Android dengan menggunakan PHP sebagai Back-End Server. Penyampaian informasi dan notifikasi secara cepat dan tepat dibutuhkan dalam komunikasi antara Android dan PHP, maka dalam pengembangannya dibutuhkan Google Cloud Messaging(GCM) yang menjadi jembatan komunikasi antara Client dan Web Server. Integrasi antara Android dan PHP sendiri dapat menjadi sebuah pengembangan teknologi yang baik dalam penggunaanya, dimana keduanya mendukung pertukaran informasi secara cepat melalui internet.


2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Hongtao Li ◽  
Xingsi Xue ◽  
Zhiying Li ◽  
Long Li ◽  
Jinbo Xiong

The widespread use of Internet of Things (IoT) technology has promoted location-based service (LBS) applications. Users can enjoy various conveniences brought by LBS by providing location information to LBS. However, it also brings potential privacy threats to location information. Location data that contains private information is often transmitted among IoT networks in LBS, and such privacy information should be protected. In order to solve the problem of location privacy leakage in LBS, a location privacy protection scheme based on k -anonymity is proposed in this paper, in which the Geohash coding model and Voronoi graph are used as grid division principles. We adopt the client-server-to-user (CS2U) model to protect the user’s location data on the client side and the server side, respectively. On the client side, the Geohash algorithm is proposed, which converts the user’s location coordinates into a Geohash code of the corresponding length. On the server side, the Geohash code generated by the user is inserted into the prefix tree, the prefix tree is used to find the nearest neighbors according to the characteristics of the coded similar prefixes, and the Voronoi diagram is used to divide the area units to complete the pruning. Then, using the Geohash coding model and the Voronoi diagram grid division principle, the G-V anonymity algorithm is proposed to find k neighbors in an anonymous area so that the user’s location data meets the k -anonymity requirement in the area unit, thereby achieving anonymity protection of location privacy. Theoretical analysis and experimental results show that our method is effective in terms of privacy and data quality while reducing the time of data anonymity.


Jurnal Teknik ◽  
2017 ◽  
Vol 5 (1) ◽  
Author(s):  
Angga Aditya Permana

MuslimisthebiggestinhabitantinIndonesia,sothatthey needanextraordinary servicewhich canprovide informationabouttheirobligatory religiousactivity inthis caseissholat.Sholat is preferabledoneatmosqueespeciallyformale.Therefore, informationaboutthenearestmosque ismuchneeded,especiallyformobileusereven traveler. Thisinformationisimplicatedinmobile device,thereforeusercanaccess wheneverandwhereverasquickaspossible.Servicethatwillbe modeledinthis research exploiting Global Positioning System(GPS)on android mobile devices based on  LocationBased  Service  (LBS).This  servicemodel  is  developedfor  providing information about location and historical background of mosquein Tangerang.Keywords:  Android,  Global  Positioning  System,  Location Based  Service,  MobileDevice.


2017 ◽  
Vol 4 (1) ◽  
pp. 1
Author(s):  
Ahmad Fali Oklilas ◽  
Sri Desy Siswanti ◽  
M Dieka Rachman

Telepon pintar sudah menjadi gaya hidup masyarakat saat ini. Selain untuk komunikasi, telepon pintar juga digunakan sebagai alat pencari informasi yang cepat serta bebas, tidak bergantung tempat dan waktu. Pencarian informasi berdasarkan posisi pengguna. Pencarian informasi tempat yang berdasarkan posisi dan waktu dapat dilakukan dengan menggunakan location based service. Permasalahan yang timbul ialah akurasi pembacaan lokasi dari alat yang ada dalam telepon seluler tersebut, yaitu global positioning system (GPS). Pada saat pembacaan, pergeseran titik posisi pengguna dapat terjadi sehingga posisi yang diperoleh tidak berada tepat pada posisi aktual di peta digital. Penelitian ini mengukur akurasi pembacaan dari GPS yang berada dalam perangkat telepon pintar Android. Data diambil berdasarkan studi kasus pada posisi lokasi sekolah SMA Negeri yang ada di Palembang. Pengambilan data dengan membuat aplikasi yang dipasang dalam perangkat telepon pintar yang secara langsung dapat mengambil, mengolah, sampai menampilkan data posisi pada peta digital di telepon pintar pengguna. Setelah data didapat, pengolahan data dengan rumus Haversine dilakukan untuk mengetahui seberapa besar pergeseran lokasi sebagai nilai akurasi alat. Pergeseran lokasi dengan membandingkan hasil pembacaan alat GPS yang berada dalam perangkat Android terhadap GPS komersial (GPS Garmin). Hasil akurasi pergeseran pembacaan yang diperoleh adalah sebesar 10.9489 meter.<br /><br />Kata Kunci: akurasi, Android, global positioning system, location based service


Sign in / Sign up

Export Citation Format

Share Document