Skip to main content

Modeling k-Anonymity Framework for the Proximity-Based Privacy Protection in Context-Aware LBS

  • Conference paper
Computational Intelligence and Information Technology (CIIT 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 250))

Abstract

With the development of Context-aware location based services, there is a large scope for user’s access to preference based services. One of the main research areas in context-aware location based services is proximity-based privacy protection for the users. The objective of our approach to proximity-based privacy protection is to deviate from the implementation of the centralized anonymizer and model the k-anonymity framework as a secure gateway in the context aware location service provider. Our design of privacy-protection is principled on guaranteed privacy protection rather than assuming the anonymizer to be a trusted third-party providing privacy protection. Using a symbolic model checker tool NuSMV, proximity based privacy protection has been modeled through the k-anonymity framework and it is observed that the system takes care of all the constraints by satisfying most of the specifications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hoareau, C., Ichiro, S.: Query language for location-based services: A model checking approach. IEICE - Trans. Inf. Syst. E91-D(4), 976–985 (2008)

    Article  Google Scholar 

  2. Moily, A., Prasanna, G., Shetty, K.S., Singh, S.: Model Checking Message Exchange in Location Based Services. In: Intl. Conf. on Computer Communication Technology, ICCCT (2010)

    Google Scholar 

  3. Asthana: An indoor wireless system for personalized shopping assistance. In: Proc. of the 1st Workshop on Mobile Computing Systems and Applications, pp. 69–74 (1994)

    Google Scholar 

  4. Zhu, T., Wang, C., Jia, G., Huang, J.: Toward Context- Aware Location Based Services. State Key Laboratory of Software Development Environment Beihang

    Google Scholar 

  5. Dey, A.K., Abowd, G.D.: Towards a better understanding of context and context-awareness. GVU Technical Report GITGVU- 99-22, College of Computing, Georgia Institute of Technology (1999)

    Google Scholar 

  6. Morse, D.R., Armstrong, S., Dey, A.K.: The What, Who, Where, When, and How of Context-Awareness. Graphics, Visualization and Usability Center, College of Computing, Georgia Institute of Technology

    Google Scholar 

  7. Chen, H., et al.: An Ontology for Context-Aware Pervasive Computing Environments. The Knowledge Engineering Review 18(3), 197–207 (2003)

    Article  Google Scholar 

  8. Jang, S., Woo, W.: Ubi-UCAM: A Unified Context-Aware Application Model. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds.) CONTEXT 2003. LNCS (LNAI), vol. 2680, pp. 178–189. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Mascetti, S., Bettini, C., Freni, D.: Privacy-Aware Proximity Based Services. In: Tenth International Conference on Mobile Data Management: Systems, Services and Middleware (2009)

    Google Scholar 

  10. Pingley, A., Yu, W.: CAP: A Context-Aware Privacy Protection System for Location-Based Services. In: 29th IEEE International Conference on Distributed Computing Systems (2009)

    Google Scholar 

  11. Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing 7(1), 1–18 (2008)

    Article  Google Scholar 

  12. Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press (2000)

    Google Scholar 

  13. Cimatti, A., Clarke, E., Giunchiglia, E., Giunchiglia, F., Pistore, M., Roveri, M., Sebastiani, R., Tacchella, A.: NuSMV 2: An Open Source Tool for Symbolic Model Checking. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol. 2404, pp. 359–364. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Cavada, R., Cimatti, A., Keighren, G., Olivetti, E., Pistore, M., Roveri, M.: NuSMV 2.2 Tutorial ITCirst - Via Sommarive 18, 38055 Povo (Trento), Italy

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rohini, B.R., Sathish Babu, B. (2011). Modeling k-Anonymity Framework for the Proximity-Based Privacy Protection in Context-Aware LBS. In: Das, V.V., Thankachan, N. (eds) Computational Intelligence and Information Technology. CIIT 2011. Communications in Computer and Information Science, vol 250. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25734-6_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25734-6_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25733-9

  • Online ISBN: 978-3-642-25734-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics