TY - GEN
T1 - Protecting location privacy in augmented reality using k-anonymization and pseudo-id
AU - Aryan, Anoop
AU - Singh, Sanjay
PY - 2010/12/30
Y1 - 2010/12/30
N2 - Location based services (LBS) are one of the most commonly used services in Augmented Reality(AR). In LBS, the safety and security of data is one of the most important things to be taken care. A privacy-aware management of location information, which provides location privacy for clients against vulnerabilities or abuse, is very much needed. This paper discusses how to protect the location privacy from various privacy threats, which occurred because of the unlimited usage of LBS, by a scalable architecture. We have developed an efficient LBS privacy protection algorithm. In our model, k-anonymization and pseudo-anonymization methods have been used hand in hand. The proposed location privacy frame work is implemented by an efficient TTP server. We have studied the efficiency of our algorithm under different conditions using realistic workloads. Our experiment shows that the k-anonymization and the pseudo-anonymization methods used together in our algorithm provide an efficient location privacy.
AB - Location based services (LBS) are one of the most commonly used services in Augmented Reality(AR). In LBS, the safety and security of data is one of the most important things to be taken care. A privacy-aware management of location information, which provides location privacy for clients against vulnerabilities or abuse, is very much needed. This paper discusses how to protect the location privacy from various privacy threats, which occurred because of the unlimited usage of LBS, by a scalable architecture. We have developed an efficient LBS privacy protection algorithm. In our model, k-anonymization and pseudo-anonymization methods have been used hand in hand. The proposed location privacy frame work is implemented by an efficient TTP server. We have studied the efficiency of our algorithm under different conditions using realistic workloads. Our experiment shows that the k-anonymization and the pseudo-anonymization methods used together in our algorithm provide an efficient location privacy.
UR - https://www.scopus.com/pages/publications/78650577704
UR - https://www.scopus.com/inward/citedby.url?scp=78650577704&partnerID=8YFLogxK
U2 - 10.1109/ICCCT.2010.5640424
DO - 10.1109/ICCCT.2010.5640424
M3 - Conference contribution
AN - SCOPUS:78650577704
SN - 9781424490349
T3 - 2010 International Conference on Computer and Communication Technology, ICCCT-2010
SP - 119
EP - 124
BT - 2010 International Conference on Computer and Communication Technology, ICCCT-2010
T2 - 2010 International Conference on Computer and Communication Technology, ICCCT-2010
Y2 - 17 September 2010 through 19 September 2010
ER -