Positioning and Privacy in Location-Based Services

Positioning and Privacy in Location-Based Services

Haibo Hu, Junyang Zhou, Jianliang Xu, Joseph Kee-Yin Ng
ISBN13: 9781615207619|ISBN10: 1615207619|EISBN13: 9781615207626
DOI: 10.4018/978-1-61520-761-9.ch014
Cite Chapter Cite Chapter

MLA

Hu, Haibo, et al. "Positioning and Privacy in Location-Based Services." Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies, edited by Wen-Chen Hu and Yanjun Zuo, IGI Global, 2010, pp. 279-299. https://doi.org/10.4018/978-1-61520-761-9.ch014

APA

Hu, H., Zhou, J., Xu, J., & Ng, J. K. (2010). Positioning and Privacy in Location-Based Services. In W. Hu & Y. Zuo (Eds.), Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies (pp. 279-299). IGI Global. https://doi.org/10.4018/978-1-61520-761-9.ch014

Chicago

Hu, Haibo, et al. "Positioning and Privacy in Location-Based Services." In Handheld Computing for Mobile Commerce: Applications, Concepts and Technologies, edited by Wen-Chen Hu and Yanjun Zuo, 279-299. Hershey, PA: IGI Global, 2010. https://doi.org/10.4018/978-1-61520-761-9.ch014

Export Reference

Mendeley
Favorite

Abstract

Location positioning by GPS has become a standard function in modern handheld device specifications. Even in indoor environments, positioning by utilizing signals from the mobile cellular network and the wireless LAN has been intensively studied. This chapter starts with some review of the state-of-the-art technologies. Positioning technologies propel the market of location-based services (LBS). They are mobile content services that provide location-related information to users. However, to enjoy these LBS services, the mobile user must explicitly expose his/her accurate location to the service provider, who might abuse such location information or even trade it to unauthorized parties. To protect privacy, traditional approaches require a trusted middleware on which user locations are anonanonymous ymized. This chapter presents two new privacy-preserving approaches without such a middleware. The first is a non-exposure location cloaking protocol where only relative distances are exchanged. The second is a protocol for nearest neighbor search with controlled location exposure.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.