Fog-Assisted Privacy Preservation Scheme for Location-Based Services Based on Trust Relationship

Fog-Assisted Privacy Preservation Scheme for Location-Based Services Based on Trust Relationship

A. B. Manju, Sumathy Subramanian
Copyright: © 2020 |Pages: 15
DOI: 10.4018/IJGHPC.2020100104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

With advancements in smart mobile devices and their capabilities, location-based services have gained utmost importance, as its individual and social benefits are enormous. Users of location-based services have a concern to the security issues posed by its usage as the location service providers track the users' interests, behavior, and identity information. Most of the location-based services are launched from mobile phones that have stringent resources; hence incorporating encryption schemes becomes tedious, and further, dual identity attacks uncover the encrypted message. A fog-assisted privacy protection scheme for location-based service (FPriLBS) employs a semi-trusted third party as a fog server to eliminate redundant queries submitted to the location service provider in addition to the trusted helper selection scheme which hides the real identity of the user from the fog server. The experimental results show that the proposed FPriLBS outperforms the existing schemes in terms of processing time and processing cost.
Article Preview
Top

Introduction

The widespread use of mobile phones with positioning capabilities has created the demand for location-based services (LBSs). The LBS need the real-time location of the user to avail the service. The tremendous opportunities in LBS have influenced the business sectors to use LBS to promote their products and services. The most popular among the location-based services are navigation service, friend finder, emergency rescue and points of interest (POI). The information shared such as location, timing and identity have led to privacy disclosure risks and the long-term information gathering unveils the user's profile. In general, it is common that the more the personal information is shared and processed, the more threatening the user becomes. The user could receive location-based advertisements and unsolicited marketing, related to the information shared by the user. The user profiling uncovers their religious beliefs, political interest, health-related information, living habits, location-time pairs of user’s presence and so on. The user’s hesitation on location-based service usage is growing, leading the research on various protection schemes. Existing literature reveals that the dominant approaches are trusted third party-based privacy protection models (TTP) (Chen et al., 2018), and the majority of such methods use encryption algorithm and, most of them are prone to dual identity attacks (Shao, Lu, & Lin, 2014). The proposed scheme incorporates the fog server to cache the query information locally and to eliminate the redundant query submission to the location service provider (LSP). In addition, the users choose the helper from their vicinity, which is based on the trust relationship in order to hide their identity from the fog server. The main focus of the proposed work is as follows:

  • 1.

    To design the privacy preservation scheme for location-based services using fog servers and trusted helpers to protects the user’s location and trajectory.

  • 2.

    To protect the location information and the user's identity from the system entities.

  • 3.

    Eliminate duplicate queries arriving at the LSP from the same location using fog servers, thereby saving communication overhead and ensuring the privacy protection of the users.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 2 Issues (2023)
Volume 14: 6 Issues (2022): 1 Released, 5 Forthcoming
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing