Information Technology Reference
In-Depth Information
this area. This approach has several limitations including the highly identifying nature
of location information [11] and the limited location resolution resulting from the ob-
fuscation or quantization needed for anonymization. At any rate, this approach is not
suitable for proximity detection because identity is important in a social network con-
text. There is a body of work on location-based encryption. Some of it assumes the ex-
istence of tamper-proof (“anti-spoof”) hardware [12]. Other work such as [13] is more
rigorous and involves securely verifying the location of the receiver based on timing or
strength of electromagnetic signals.
5
Conclusion and Future Work
Proximity discovery is very practical and interesting in location tagging systems. We
have proposed Produre, a novel proximity discovery mechanism based on users' cred-
ibilities. Our experiments based on real environment show that Produre can effectively
discover proximities of a user in an efficient and accurate way with high quality and
fewer mistakes.
In the future, we plan to apply Produre mechanism with more secure cryptographic
features. Some improvements may be added, such as the use of attribute-based encryp-
tion (ABE) and identity-based encryption (IBE).
References
1. Facebook, http://www.facebook.com/
2. Renren, http://www.renren.com/
3. Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location Privacy via
Private Proximity Testing. In: NDSS (2011)
4. Flickr, http://www.flickr.com/
5. Del.icio.us, http://del.icio.us/
6. YouTube, http://www.youtube.com/
7. Google, http://www.google.com/
8. Netease Bafang, http://bafang.163.com/
9. Siksnys, L., Thomsen, J.R., Saltenis, S., Yiu, M.L., Andersen, O.: A location privacy
aware friend locator. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds.)
SSTD 2009. LNCS, vol. 5644, pp. 405-410. Springer, Heidelberg (2009)
10. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial
and temporal cloaking. In: MobiSys 2003, pp. 31-42 (2003)
11. Golle, P., Partridge, K.: On the anonymity of home/Work location pairs. In: Tokuda, H.,
Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp.
390-397. Springer, Heidelberg (2009)
12. Scott, L., Denning, D.E.: A location based encryption technique and some of its applications.
Institute of Navigation National Technical Meeting, pp. 734-740 (2003)
13. Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings
of the 2nd ACM workshop on Wireless security (WiSe 2003), pp. 1-10 (2003)
 
Search WWH ::




Custom Search