A Survey on Privacy Preservation in Location-Based Mobile Business: Research Directions

A Survey on Privacy Preservation in Location-Based Mobile Business: Research Directions

Ahmed Aloui, Okba Kazar
Copyright: © 2021 |Pages: 20
DOI: 10.4018/IJWP.2021010102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In mobile business (m-business), a client sends its exact locations to service providers. This data may involve sensitive and private personal information. As a result, misuse of location information by the third party location servers creating privacy issues for clients. This paper provides an overview of the privacy protection techniques currently applied by location-based mobile business. The authors first identify different system architectures and different protection goals. Second, this article provides an overview of the basic principles and mechanisms that exist to protect these privacy goals. In a third step, the authors provide existing privacy protection measures.
Article Preview
Top

1. Introduction

Nowadays, people are becoming more and busier and therefore prefer online mobile business portals to the markets or offline stores. In this way, websites based on mobile business are the best solution for many entrepreneurs. To be able to sell their products to a large number of users all over the world. The mobile devices with enhanced positioning technology (as GPS) have significantly increased the use of m-business. M-business is a general category of information services available to mobile users that uses information about the geographic locations of mobile clients based on mobile communication technologies (for example GPS). As a result, new types of m-business applications providing location-based services (LBS) have become popular in recent years.

In m-business, a customer sends its exact locations to service providers. This data may involve sensitive and private personal information. As a result, misuse of location information by service providers creating privacy issues for customers. Therefore, location-based mobile business can also pose a serious threat to the privacy of users (Shklovski, Mainwaring et al., 2014). For example, revealing specific user location may allow an adversary to derive sensitive information when a user visits, such as a hospital. In addition, revealed user data could be used for criminal harassment, armed robbery or search for empty houses for burglary. As a result, mechanisms for protecting location privacy are mandatory when using m-business providing LBS. A mechanism most commonly used to protect users' locations is the obfuscation of the location, which deliberately reduces the accuracy of a location, so that attackers can only retrieve coarse-grained location information (Ardagna et al., 2007).

Mechanisms implementing the concept of k-anonymity (Kalnis et al., 2007) to protect the identity of the user (examples of different privacy goals). In general, these mechanisms attempt to find a set of k users that cannot be distinguished from each other, so that an attacker cannot identify a single user outside of this set.

Location information has three aspects: identity, location, and time. If an attacker is able to make the connection between them, the privacy of the location is broken. Historical location data are also important because they enable behavior models to be established and possibly identify the user’s home, place of work and generally frequented places.

In the 19th century, Louis Brandeis defines the term of privacy and is actually quite simple: “The right to be left alone” (Wightman et al., 2013), that is why privacy itself is a complex subject. There are different approaches to meeting the privacy requirements of m-business providing LBS. Some are designed to protect the user’s identity when sending queries; others focus on protecting specifically the user’s location. Some have also proposed protocols for the query privacy specifically as well. In (Micciancio et al., 2010) the authors have presented a framework providing specifics to obfuscate queries. An ideal approach to ensure the privacy of the location would provide statistics on the behavior of m-business users while protecting each individual identity and location information. Statistics are important to ensure service improvements that enable Ambient Intelligence techniques.

This paper will provide information on available Location Privacy Protection Mechanisms (MPPPs), identify their ease of use and provide a measure for comparing methods. In addition, in this article, we present the key concept of location privacy metric. A location privacy metric is used to estimate the level of protection offered to users.

The rest of the paper is organized as follows. The relation between m-business and web portals are discussed in Section 2. The privacy model is discussed in Section 3. The different system architectures for the customer privacy protection are presented in section 4. In section 5, we define the different protection objectives. The technological measures for the protection of privacy are presented in section 6. In section 7, we provide an overview of existing mechanisms for user privacy protection to achieve the different protection objectives. In section 8, we propose a qualitative comparison of the mechanisms based on a simple comparison table. Discussion and analysis are presented in section 9. Finally, existing privacy protection measures, conclusions and future works are drawn in section 10 and 11.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 13: 2 Issues (2021)
Volume 12: 2 Issues (2020)
Volume 11: 2 Issues (2019)
Volume 10: 2 Issues (2018)
Volume 9: 2 Issues (2017)
Volume 8: 1 Issue (2016)
Volume 7: 2 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing