{"title":"Using broadcast to protect user privacy in location-based applications","authors":"Fuyu Liu, G. Hamza-Lup, K. Hua","doi":"10.1109/GLOCOMW.2010.5700201","DOIUrl":null,"url":null,"abstract":"Most existing cloaking techniques are based on a three-tier architecture: mobile users, a trusted anonymizer server, and service providers. In this paper, we propose a new three-tier architecture, where the trusted anonymizer server also serves as a broadcast server. The trusted anonymizer server takes a proactive approach. It first groups mobile users into clusters. Then for each cluster, it fetches the most popular query results from service providers. The query results are then broadcast through an air channel to reach all mobile users. As a result, to get a query answered, a mobile user can first tune into the air channel to determine if the query result is available. If not, the mobile user just sends a traditional location-based query to the trusted anonymizer server. Other than the novel new three-tier architecture, we also propose two cell-based clustering algorithms, and a broadcast index to facilitate the download of query results. The proposed techniques are compared using simulation against the improved Interval Cloak technique under the traditional three-tier architecture. The extensive results show that our system is better in reducing communication cost and protecting user privacy.","PeriodicalId":232205,"journal":{"name":"2010 IEEE Globecom Workshops","volume":"93 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Globecom Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GLOCOMW.2010.5700201","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Most existing cloaking techniques are based on a three-tier architecture: mobile users, a trusted anonymizer server, and service providers. In this paper, we propose a new three-tier architecture, where the trusted anonymizer server also serves as a broadcast server. The trusted anonymizer server takes a proactive approach. It first groups mobile users into clusters. Then for each cluster, it fetches the most popular query results from service providers. The query results are then broadcast through an air channel to reach all mobile users. As a result, to get a query answered, a mobile user can first tune into the air channel to determine if the query result is available. If not, the mobile user just sends a traditional location-based query to the trusted anonymizer server. Other than the novel new three-tier architecture, we also propose two cell-based clustering algorithms, and a broadcast index to facilitate the download of query results. The proposed techniques are compared using simulation against the improved Interval Cloak technique under the traditional three-tier architecture. The extensive results show that our system is better in reducing communication cost and protecting user privacy.