Towards achieving anonymity in LBS: A cloud based untrusted middleware

Fizza Abbas, Rasheed Hussain, Junggab Son, Hasoo Eun, Heekuck Oh

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Abstract

Technological advancements in mobile technology and cloud computing open the door for another paradigm known as Mobile Cloud Computing (MCC). This integration of cloud computing and mobile technology gives numerous facilities to a mobile user, such as the ubiquitous availability of Location Based Services (LBS). The utilization of these LBS services require the knowledge of a user's location, hence threatens the privacy of a user. In this paper we take advantages of ultra-fast processing and reliability of cloud computing and aim to solve the privacy threat issue faced by a mobile user while getting LBS services. We propose a model that utilizes a cloud based server which helps in making of a cloaking region. We highlight that how our model utilizes an untrusted cloud based server and eliminates the use of a trusted anonymizer while providing LBS services to a user securely and anonymously.

Original languageEnglish
Title of host publicationTowards achieving anonymity in LBS
Subtitle of host publicationA cloud based untrusted middleware
Pages262-265
Number of pages4
Volume2
DOIs
Publication statusPublished - 2013
Event5th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2013 - Bristol, United Kingdom
Duration: 2 Dec 20135 Dec 2013

Publication series

NameProceedings of the International Conference on Cloud Computing Technology and Science, CloudCom
ISSN (Print)2330-2194

Conference

Conference5th IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2013
Country/TerritoryUnited Kingdom
CityBristol
Period2/12/135/12/13

Keywords

  • Location Based Services
  • Mobile Cloud Computing
  • Point of Interest

Fingerprint

Dive into the research topics of 'Towards achieving anonymity in LBS: A cloud based untrusted middleware'. Together they form a unique fingerprint.

Cite this