Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2184751.2184824acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

An open design privacy-enhancing platform supporting location-based applications

Published: 20 February 2012 Publication History

Abstract

The world of location-based services (LBS) has been becoming more diversifying and amazing with its rapid growth in recent years. Moreover, the development has spread to many aspects in all walks of life and got powerful promotion from advanced information and communication technologies. Its pervasive moves, however, leave great concerns behind, which can cause roadblocks in the path of its prosperity. Three of them, identified as heterogeneity, user privacy, and context-awareness, have called for much attention and investigation in both research and industry community world-wide. In response to the call, we propose an elastic and open design platform named OpenLS Privacy-aware Middleware (OPM) for location-based applications as a unified solution to these issues.

References

[1]
A. Küpper, G. Treu, and C. Linnhoff-Popien, "TraX: A Device-Centric Middleware Framework for Location-Based Services," IEEE Communications Magazine, Vol. 44, No. 9, pp. 114--120, 2006.
[2]
Chi-Yin Chow, Mohamed F. Mokbel, and Walid G. Aref, "Casper*: Query processing for location services without compromising privacy," ACM Trans. Database Syst., Vol. 34, No. 4, 2009.
[3]
Jo J., K. Min, and Y. Lee, "Architecture of an LBS Platform to Support Privacy Control for Tracking Moving Objects in a Ubiquitous Environments," LNCS 4412, pp. 273--282, 2007.
[4]
Kalnis P., Ghinita G., Mouratidis K., and Papadias D., "Preventing Location-Based Identity Inference in Anonymous Spatial Queries," IEEE Transactions on Knowledge and Data Engineering, Vol. 19, issue 12, pp. 1719--1733, December 2007.
[5]
C. A. Ardagna, M. Cremonini, S. De Capitani di Vimercati, and P. Samarati, "Location Privacy in Pervasive Computing," in Security and Privacy in Mobile and Wireless Networking, S. Gritzalis, T. Karygiannis, and C. Skianis (eds.), Troubador Publishing, 2008.
[6]
Hu H., and Lee D. L., "Range nearest-neighbor query," IEEE TKDE Vol. 18, No. 1, pp. 78--91, 2006.
[7]
S. Barbeau, M. Labrador, P. Winters, R. Perez and N. Georggi, "Location API 2.0 for J2ME -- A new standard in location for Java-enabled mobile phones," Computer Communications, pp. 1091--1103, 2008.
[8]
Cuellar J. R., "Location Information Privacy," B. Srikaya (Ed.), "Geographic Location in the Internet," Kluwer Academic Publishers, pp. 179--208, 2002.
[9]
A. F. Westin, "Privacy and Freedom," New York NY: Atheneum, 1967.
[10]
Gruteser M., and Grunwald D., "Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking," in Proc. of MobiSys, pp. 31--42, 2003.
[11]
D. Fritsch and S. Volz, "Nexus - the mobile GIS-environment," SympoTIC'03, Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications, pp. 1--4, 2003.
[12]
Karen Henricksen, Jadwiga Indulska, and Andry Rakotonirainy, "Modeling Context Information in Pervasive Computing System," in F. Mattern and M. Naghshinel (Eds.), "Pervasive 2002," LCNS 2414, pp. 167--180, 2002, Spriger-Verlag Berlin Heidelberg 2002.
[13]
A. Ranganathan, J. Al-Muhtadi, S. Chetan, R. Campbell, and M. Mickunas, "MiddleWhere: a middleware for location awareness in ubiquitous computing applications," in Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware, Springer, New York, 2004.
[14]
P. Korpipää, J. Mäntyjärvi, J. Kela, H. Keränen, and E. J. Malm, "Managing context information in mobile devices," in Pervasive Computing, IEEE, Vol. 2, No. 3, pp. 42--51, 2003.
[15]
Roth J., "Novel architectures for location-based services," in Annual Meeting for Information Technology & Computer Science, Stuttgart, Germany, 2004.
[16]
Pinheiro M. K., Vanrompay Y., and Berbers Y, "Context-Aware Service Selection Using Graph Matching," Proceedings of the 2nd NFPSLA-SOC Workshop at ECOWS 2008, Ireland, pp. 1--14, 2008.
[17]
Bellavista, P., A. Corradi, and C. Giannelli, "Efficiently Managing Location Information with Privacy Requirements in Wi-Fi Networks, a Middleware approach," in 2nd International Symposium on Wireless Communication Systems, 2005.
[18]
European IST-FP6 project MUSIC (Self-adapting applications for Mobile Users In Ubiquitous Computing), available at: http://www.ist-music.eu (referenced on 5th August, 2011)
[19]
Creativity Software, "An advanced Middleware solution (MiddleWise)," available at: http://www.creativitysoftware.net/products/infrastructure/middleware (referenced on 10th July, 2010)
[20]
Mobilaris, "Pacific Ocean Middleware," available at: http://www.mobilaris.com/main.asp?areaID=36&Content=CategoryID&levelID=76&CategoryID=76 (referenced on 10th July, 2010)
[21]
Paolo Bellavista, Antonio Corradi, and Carlo Giannelli, "The PoSIM Middleware for Translucent and Context-aware Integrated Management of Heterogeneous Positioning Systems," Computer Communications, special issue on Advanced Location-Based Services, Elsevier, Vol. 31/6, pp. 1078--1090, April 2008.
[22]
TeleCommunication Systems, "Xypoint Location Platform," available at: http://www.telecomsys.com/products/location-based-services/infrastructure-GSM/middleware.aspx (referenced on 10th July, 2010)
[23]
Amelunxen C., "An Approach to Geocoding Based on Volunteered Spatial Data," in Zipf, A. et al.: Geoinformatik 2010, "Die Welt im Netz", 7--12.
[24]
Tom Bychowski et al., "OpenGIS® Location Services (OpenLS): Core Services," Open Geospatial Consortium Inc., Project Document Number: OGC 07-074, pp. 1--179, 2008, available at: http://www.opengeospatial.org/standards/ols (referenced on 15th June, 2010)
[25]
A. Küpper, "Location-Based Services: Fundamentals and Operation," John Wiley & Sons Ltd, England, New York, pp. 315--341, 2005.
[26]
Mobile Location Protocol Specification, In Location Interoperability Forum (LIF) Mobile Location Protocol, LIF TS 101 Specification, Version 3.0.0, 6 June 2002, pp. 1--92, available at: http://www.openmobilealliance.org/tech/affiliates/lif/lifindex.html (referenced on 15th June, 2010)
[27]
M. T. Vo, L. K. Tran, T. N. Phan, and N. N. M. Ngo, "An Openls-Based Middleware Supporting Location-Based Services," Journal of Science and Technology, Vietnamese Academy of Science and Technology, ISSN 0866-708X, Vol. 49, No. 4A, 2011, pp. 271--279 (a Special Issue on ACOMP2011), Ho Chi Minh City, Vietnam.
[28]
A. LaMarca et al., "Place Lab: Device Positioning Using Radio Beacons in the Wild," Proc. 3rd Int'l Conf, Pervasive Computing (Pervasive 05), LNCS 3468, pp. 116--133, 2005.
[29]
Bettini C., Wang X. S., and Jajodia S., "How anonymous is k-anonymous? look at your quasi-id," in Jonker W., Petkovic M. (eds.), SDM 2008, LNCS, Vol. 5159, pp. 1--15, Springer Heidelberg.
[30]
Mokbel M. F., Chow C., and Aref W. G., "The New Casper: Query Processing for Location Services without Compromising Privacy," Proc. of VLDB, 2006, pp. 763--774.
[31]
Ghinita G., Kalnis P., and Skiadopoulos S., "PRIVÉ: Anonymous Location-Based Queries in Distributed Mobile Systems," Proc. of WWW, pp. 371--380, 2007.
[32]
Duckham M. and Kulik L., "A formal model of obfuscation and negotiation for location privacy," Proc. of 3rd International Conference on Pervasive Computing, Springer-Verlag, pp. 152--170, 2005.
[33]
C. A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati, and P. Samarati, "Location Privacy Protection Through Obfuscation-Based Techniques," IFIP International Federation for Information Processing, 2007.
[34]
M. L. Damiani, C. Silvestri, and E. Bertino, "Semantics-aware Obfuscation for Location Privacy," Journal of Computing Science and Engineering, Vol. 2, No. 2, June 2008.
[35]
Yiu M. L., et al., "Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services," in ICDE, 2008.
[36]
Khoshgozaran A. and C. Shahabi, "Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services," in Privacy in Location-Based Applications, Springer-Verlag, pp. 59--83, 2009.
[37]
Q. C. To, T. K. Dang, and J. Küng, "OST-tree: An Access Method for Obfuscating Spatio-Temporal Data in Location Based Services," In Proceedings of the 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS2011), IEEE Computer Society, ISBN 978-1-4244-8704-2, Paris, France, 7--10 February 2011 (
[38]
T. K. Dang, N. Thoai, Q. C. To, T. N. Phan, "A Database-Centric Approach to Privacy Protection in Location-Based Applications," In Proceedings of the 3rd Regional Conference on ICT Applications for Industries and Small Companies in ASEAN countries (RCICT2011), Vientiane, Lao PDR, March 10--11, 2011, pp. 65--71.
[39]
Q. C. To, T. K. Dang, and J. Küng, "Bob-Tree: An Efficient B+-Tree Based Index Structure for Geographic-aware Obfuscation," In Proceedings of the 3rd Asian Conference on Intelligent Information and Database Systems (ACIIDS-2011), LNAI 6591, Springer Verlag, Heidelberg, Daegu, Korea, 20--22 April 2011, pp. 109--118.
[40]
T. N. Phan, T. K. Dang, and J. Küng, "User Privacy Protection from Trajectory Perspective in Location-based Applications," In Proceedings of the 19th Interdisciplinary Information Management Talks (IDIMT2011), September 7--9, 2011, Jindfichuv Hradec, Czech Republic, pp. 281--288.
[41]
Kupper A., "Location-based Services - Fundamentals and Operation," John Wiley & Sons, 2005.
[42]
C. A. Ardagna, Marco Cremonini, S. De Capitani di Vimercati, Pierangela Samarati, "Privacy-enhanced location-based access control," In: Handbook of database security: applications and trends, {edited by} Michael Gertz, Sushil Jajodia, New York: Springer, 2007, ISBN 9780387485324, pp. 531--552.
[43]
M. F. Mokbel, "Towards Privacy-Aware Location-Based Database Servers," In International Workshop on Privacy Data Management, PDM, April 2006.
[44]
Meriam-Webster: http://www.w-m.com (referenced on 5th August, 2011)
[45]
B. Schilit, N. Adams, and R. Want, "Context-aware computing applications," In Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, California, December 1994, pp. 85--90, IEEE Computer Society Press.
[46]
G. Chen, and D. Kotz, "A Survey of Context-Aware Mobile Computing Research," Dartmouth College Technical Report TR2000-381, November 2000.
[47]
A. Schmidt, K. A. Aidoo, A. Takaluoma, U. Tuomela, K V. Laerhoven, and Walter Van de Velde, "Advanced interaction in context," In Proceedings of First International Symposium on Handheld and Ubiquitous Computing, HUC'99, pp. 89--101, Karlsruhe, Germany, September 1999, Springer Verlag.
[48]
A. K Dey and G D. Abowd, "Towards a Better Understanding of context and context-awareness," Technical Report GIT-GVU-99-22, Georgia Institute of Technology, College of Computing, June 1999.
[49]
A. Zimmermann, A. Lorenz, R. Oppermann, "An Operational Definition of Context," In B. Kokinov et al. (Eds.): CONTEXT 2007, LNAI 4635, pp. 558--571, 2007, Springer-Verlag Berlin Heidelberg 2007.
[50]
B. N. Schilit, M. M. Theimer, and B. B. Welch, "Customizing mobile applications," In Proceedings of USENIX Mobile & Location-Independent Computing Symposium, pp. 129--138, Cambridge, Massachusetts, August 1993, USENIX Association.
[51]
P. J. Brown, J. D. Bovey, and X. Chen, "Context-aware applications: from the laboratory to the marketplace," IEEE Personal Communications, Vol. 4, No. 5, pp. 58--64, October 1997.
[52]
J. Pascoe, "The Stick-e note architecture: Extending the interface beyond the user," In Proceedings of the 1997 International Conference on Intelligent User Interfaces, pp. 261--264, Orlando, FL, January 1997, ACM Press.
[53]
K. Cheverst, K. Mitchell, and N. Davies, "Design of an object model for a context-sensitive tourist GUIDE," In Proceedings of Workshop on Interactive Applications of Mobile Computing (IMC98), Rostock, Germany, November 1998, Neuer Hochschulschriftverlag.
[54]
N. Davies, K. Cheverst, K. Mitchell, and A. Friday, "Caches in the air: Disseminating tourist information in the GUIDE system," In Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, Louisiana, February 1999, IEEE Computer Society Press.
[55]
J. Bacon, J. Bates, and D. Halls, "Location-oriented multimedia," IEEE Personal Communications, Vol. 4, No. 5, pp. 48--57, 1997.

Cited By

View all
  • (2013)On efficient processing of complicated cloaked region for location privacy aware nearest-neighbor queriesProceedings of the 2013 international conference on Information and Communication Technology10.1007/978-3-642-36818-9_11(101-110)Online publication date: 25-Mar-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICUIMC '12: Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
February 2012
852 pages
ISBN:9781450311724
DOI:10.1145/2184751
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 February 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. OpenLS
  2. context awareness
  3. location-based services
  4. middleware
  5. user privacy

Qualifiers

  • Research-article

Conference

ICUIMC '12
Sponsor:

Acceptance Rates

Overall Acceptance Rate 251 of 941 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)1
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2013)On efficient processing of complicated cloaked region for location privacy aware nearest-neighbor queriesProceedings of the 2013 international conference on Information and Communication Technology10.1007/978-3-642-36818-9_11(101-110)Online publication date: 25-Mar-2013

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media