Cache Management Techniques for Privacy Preserving Location-based Services
#1

Abstract
In order to access location-based services, mobile users have to disclose their exact locations to service providers. However, adversaries could collect the location information for purposes against mobile usersâ„¢ privacy. There are existing solutions for privacy protection by utilizing the K-anonymity model. However, the computational and communication costs are high. This research proposes cache management techniques for further improving user privacy protection, saving computational power, and decreasing communication costs.
Presented By:
Yu Chen
Jie Bao
Wei-Shinn Ku
Jiun-Long Huang


Introduction
As a result of recent advances in wireless technologies, more and more personal mobile devices (e.g., cell phones, PDAs, etc.) possess the ability to access the Internet ubiquitously. In addition, Global Positioning System (GPS) receiver modules gradually become a standard component in new generation handheld devices. Consequently, novel location based services (LBS) allow users to launch location-dependent queries ubiquitously. Sample queries of such location based services include find me the nearest ATM and show me the gas station with the lowest price within one mile. In order to fulfill these queries, mobile users have to reveal their current locations to service providers. However, service providers may disclose the trajectory of a certain user to attackers which decreases the dependability of LBS. For protecting mobile userâ„¢s privacy, recent research in [12] proposed a framework for location based services without compromising location privacy by leveraging the K-anonymity concept [15]. In order to implement the K-anonymity mechanism, the framework contains a trusted server to collect user location information and perform cloaking procedures. Then, the trusted server will send the location- dependent query along with the cloaked spatial area to service providers to retrieve query results. The returned query solutions will be sent back to individual users by the trusted server as well. Since the trusted server has the knowledge of all query results, we propose to store them in memory and use the cached data to answer future queries. Our solution has two main advantages. First, user privacy protection can be further improved, because the trusted server does not have to forward every query to service providers and it is much more difficult for adversaries to launch correlation attacks [3]. Second, with our cache management techniques, fewer queries have to be answered by service providers. Consequently, computational resources and communication costs can be effectively saved. The rest of the paper is organized as follows: Section 2 surveys the related work of privacy protected query processing. Our own system design is detailed in Section 3. The experimental results are presented in Section 4. We conclude this paper in section 5, and we also raise some open issues for future research.


read full report
http://eng.auburn.edu/~weishinn/papers/PALMS08.pdf
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: abstract for dynami cache management technique, cache management techniques for privacy preserving location based services pdf, privacy preserving topics, fms management services, applaus a privacy preserving location proof updating system for location based services, a privacy preserving remote, cache management design pattern,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ULTRA SONIC TECHNIQUES FOR THE DETECTION OF HIDDEN CORROSION IN AIR CRAFT WING SKIN seminar projects crazy 5 6,073 15-04-2016, 08:04 PM
Last Post: knagpur
  Image Processing & Compression Techniques (Download Full Seminar Report) Computer Science Clay 42 22,826 07-10-2014, 07:57 PM
Last Post: seminar report asees
  Adaptive Replacement Cache Full Download Seminar Report and Paper Presentation computer science crazy 1 2,985 19-04-2014, 07:01 PM
Last Post: Guest
  Web Services Architecture computer topic 0 7,568 25-03-2014, 10:20 PM
Last Post: computer topic
Brick Face Recognition using the Techniques Base on Principal Component Analysis (PCA) computer science crazy 3 2,968 04-03-2013, 01:21 PM
Last Post: Guest
  Distributed Cache Updating for the Dynamic Source Routing Protocol seminar class 3 2,286 17-11-2012, 01:26 PM
Last Post: seminar details
  Eye Movement-Based Human-Computer Interaction Techniques computer girl 1 3,938 17-10-2012, 01:24 PM
Last Post: Guest
  VWS: Applying virtualization techniques to Web Services computer girl 0 1,100 09-06-2012, 11:38 AM
Last Post: computer girl
  A Review of Data Compression Techniques seminar surveyer 1 1,692 01-03-2012, 11:42 AM
Last Post: seminar paper
  PLATONIS - A Validation Platform for Protocols and Services seminar projects crazy 4 2,948 01-03-2012, 10:30 AM
Last Post: seminar paper

Forum Jump: