An anonymous communication technique using dummies for location-based services
Top Cited Papers
- 12 September 2005
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Recently, highly accurate positioning devices enable us to provide various types of location-based services. On the other hand, because such position data include deeply personal information, the protection of location privacy is one of the most significant problems in location-based ser- vices. In this paper, we propose an anonymous communi- cation technique to protect the location privacy of the users of location-based services. In our proposed technique, such users generateseveralfalse positiondata(dummies)to send to service providers with the true position data of users. Be- cause service providers cannot distinguish the true position data, user location privacy is protected. We also describe a cost reduction technique for communication between a client and a server. Moreover, we conducted performance study experiments on our proposed technique using practi- cal position data. As a result of the experiments, we ob- served that our proposed technique protects the location privacy of people and can sufficiently reduce communica- tion costs so that our communication techniques can be ap- plied in practical location-based services.Keywords
This publication has 9 references indexed in Scilit:
- Anonymous Usage of Location-Based Services Through Spatial and Temporal CloakingPublished by Association for Computing Machinery (ACM) ,2003
- Location privacy in pervasive computingIEEE Pervasive Computing, 2003
- Anonymity, Unobservability, and Pseudonymity — A Proposal for TerminologyPublished by Springer Nature ,2001
- DOMINOPublished by Association for Computing Machinery (ACM) ,1999
- Onion routingCommunications of the ACM, 1999
- CrowdsACM Transactions on Information and System Security, 1998
- Perspective/navigation-The Global Positioning SystemIEEE Spectrum, 1993
- The dining cryptographers problem: Unconditional sender and recipient untraceabilityJournal of Cryptology, 1988
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981