Reference Hub16
Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey

Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey

Emmanouil Magkos
Copyright: © 2011 |Volume: 4 |Issue: 2 |Pages: 22
ISSN: 1935-570X|EISSN: 1935-5718|EISBN13: 9781613507803|DOI: 10.4018/jitsa.2011070104
Cite Article Cite Article

MLA

Magkos, Emmanouil. "Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey." IJITSA vol.4, no.2 2011: pp.48-69. http://doi.org/10.4018/jitsa.2011070104

APA

Magkos, E. (2011). Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey. International Journal of Information Technologies and Systems Approach (IJITSA), 4(2), 48-69. http://doi.org/10.4018/jitsa.2011070104

Chicago

Magkos, Emmanouil. "Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey," International Journal of Information Technologies and Systems Approach (IJITSA) 4, no.2: 48-69. http://doi.org/10.4018/jitsa.2011070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Current research in location-based services (LBSs) highlights the importance of cryptographic primitives in privacy preservation for LBSs, and presents solutions that attempt to support the (apparently) mutually exclusive requirements for access control and context privacy (i.e., identity and/or location), while at the same time adopting more conservative assumptions in order to reduce or completely remove the need for trust on system entities (e.g., the LBS provider, the network operator, or other peer nodes). This paper surveys the current state of knowledge concerning the use of cryptographic primitives for privacy-preservation in LBS applications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.