Abstract
With the development of Context-aware location based services, there is a large scope for user’s access to preference based services. One of the main research areas in context-aware location based services is proximity-based privacy protection for the users. The objective of our approach to proximity-based privacy protection is to deviate from the implementation of the centralized anonymizer and model the k-anonymity framework as a secure gateway in the context aware location service provider. Our design of privacy-protection is principled on guaranteed privacy protection rather than assuming the anonymizer to be a trusted third-party providing privacy protection. Using a symbolic model checker tool NuSMV, proximity based privacy protection has been modeled through the k-anonymity framework and it is observed that the system takes care of all the constraints by satisfying most of the specifications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Hoareau, C., Ichiro, S.: Query language for location-based services: A model checking approach. IEICE - Trans. Inf. Syst. E91-D(4), 976–985 (2008)
Moily, A., Prasanna, G., Shetty, K.S., Singh, S.: Model Checking Message Exchange in Location Based Services. In: Intl. Conf. on Computer Communication Technology, ICCCT (2010)
Asthana: An indoor wireless system for personalized shopping assistance. In: Proc. of the 1st Workshop on Mobile Computing Systems and Applications, pp. 69–74 (1994)
Zhu, T., Wang, C., Jia, G., Huang, J.: Toward Context- Aware Location Based Services. State Key Laboratory of Software Development Environment Beihang
Dey, A.K., Abowd, G.D.: Towards a better understanding of context and context-awareness. GVU Technical Report GITGVU- 99-22, College of Computing, Georgia Institute of Technology (1999)
Morse, D.R., Armstrong, S., Dey, A.K.: The What, Who, Where, When, and How of Context-Awareness. Graphics, Visualization and Usability Center, College of Computing, Georgia Institute of Technology
Chen, H., et al.: An Ontology for Context-Aware Pervasive Computing Environments. The Knowledge Engineering Review 18(3), 197–207 (2003)
Jang, S., Woo, W.: Ubi-UCAM: A Unified Context-Aware Application Model. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds.) CONTEXT 2003. LNCS (LNAI), vol. 2680, pp. 178–189. Springer, Heidelberg (2003)
Mascetti, S., Bettini, C., Freni, D.: Privacy-Aware Proximity Based Services. In: Tenth International Conference on Mobile Data Management: Systems, Services and Middleware (2009)
Pingley, A., Yu, W.: CAP: A Context-Aware Privacy Protection System for Location-Based Services. In: 29th IEEE International Conference on Distributed Computing Systems (2009)
Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7(1), 1–18 (2008)
Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press (2000)
Cimatti, A., Clarke, E., Giunchiglia, E., Giunchiglia, F., Pistore, M., Roveri, M., Sebastiani, R., Tacchella, A.: NuSMV 2: An Open Source Tool for Symbolic Model Checking. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, pp. 359–364. Springer, Heidelberg (2002)
Cavada, R., Cimatti, A., Keighren, G., Olivetti, E., Pistore, M., Roveri, M.: NuSMV 2.2 Tutorial ITCirst - Via Sommarive 18, 38055 Povo (Trento), Italy
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rohini, B.R., Sathish Babu, B. (2011). Modeling k-Anonymity Framework for the Proximity-Based Privacy Protection in Context-Aware LBS. In: Das, V.V., Thankachan, N. (eds) Computational Intelligence and Information Technology. CIIT 2011. Communications in Computer and Information Science, vol 250. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25734-6_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-25734-6_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25733-9
Online ISBN: 978-3-642-25734-6
eBook Packages: Computer ScienceComputer Science (R0)