Ensuring Anonymity for LBSs in Smartphone Environment

Mohammed Alzaabi, Chan Yeob Yeun and Thomas Anthony Martin
Volume: 7, No: 1, Page: 121 ~ 136, Year: 2011
Keywords: Location Based Services, Anonymity, Location Information
Full Text:

With the rapid growth of GPS-enable Smartphones, the interest on using Location Based Services (LBSs) has increased significantly. The evolution in the functionalities provided by those smartphones has enabled them to accurately pinpoint the location of a user. Because location information is what all LBSs depend on to process user¡¯s request, it should be properly protected from attackers or malicious service providers (SP). Additionally, maintaining user¡¯s privacy and confidentiality are imperative challenges to be overcome. A possible solution for these challenges is to provide user anonymity, which means to ensure that a user initiating a request to the SP should be indistinguishable from a group of people by any adversary who had access to the request. Most of the proposals that maintain user¡¯s anonymity are based on location obfuscation. It mainly focuses on adjusting the resolution of the user¡¯s location information. In this paper, we present a new protocol that is focused on using cryptographic techniques to provide anonymity for LBSs users in the smartphone environment. This protocol makes use of a trusted third party called the Anonymity Server (AS) that ensures anonymous communication between the user and the service provider.

Article Statistics
Multiple requests among the same broswer session are counted as one view (or download).
If you mouse over a chart, a box will show the data point's value.

Cite this article
IEEE Style
M. Alzaabi and C. Y. Y. T. A. Martin, "Ensuring Anonymity for LBSs in Smartphone Environment," Journal of Information Processing Systems, vol. 7, no. 1, pp. 121~136, 2011. DOI: 10.3745/JIPS.2011.7.1.121 .

ACM Style
Mohammed Alzaabi, Chan Yeob Yeun and Thomas Anthony Martin. 2011. Ensuring Anonymity for LBSs in Smartphone Environment, Journal of Information Processing Systems, 7, 1, (2011), 121~136. DOI: 10.3745/JIPS.2011.7.1.121 .