TY - GEN
T1 - Securing location privacy in augmented reality
AU - Aryan, Anoop
AU - Singh, Sanjay
PY - 2010/11/2
Y1 - 2010/11/2
N2 - In Augmented Reality (AR), users main concern includes privacy and safety of data. Since location based services (LBS) are one of the major applications of the AR, it is important to have a privacy-aware management of location information, providing location privacy for clients against vulnerabilities or abuse. This paper discusses how to protect the location privacy from various privacy threats, which occurred because of the unlimited usage of LBS, by a scalable architecture. We have developed an efficient LBS privacy protection algorithm. In our model, k-anonymization and pseudo-anonymization methods are used hand in hand. The proposed location privacy frame work is implemented by an efficient trusted third party server. We have studied the efficiency of our algorithm under different conditions using realistic work loads. Our experiment shows that the k-anonymization and the pseudo-anonymization methods used together in our algorithm provide an efficient location privacy.
AB - In Augmented Reality (AR), users main concern includes privacy and safety of data. Since location based services (LBS) are one of the major applications of the AR, it is important to have a privacy-aware management of location information, providing location privacy for clients against vulnerabilities or abuse. This paper discusses how to protect the location privacy from various privacy threats, which occurred because of the unlimited usage of LBS, by a scalable architecture. We have developed an efficient LBS privacy protection algorithm. In our model, k-anonymization and pseudo-anonymization methods are used hand in hand. The proposed location privacy frame work is implemented by an efficient trusted third party server. We have studied the efficiency of our algorithm under different conditions using realistic work loads. Our experiment shows that the k-anonymization and the pseudo-anonymization methods used together in our algorithm provide an efficient location privacy.
UR - https://www.scopus.com/pages/publications/77958589618
UR - https://www.scopus.com/inward/citedby.url?scp=77958589618&partnerID=8YFLogxK
U2 - 10.1109/ICIINFS.2010.5578714
DO - 10.1109/ICIINFS.2010.5578714
M3 - Conference contribution
AN - SCOPUS:77958589618
SN - 9781424466535
T3 - 2010 5th International Conference on Industrial and Information Systems, ICIIS 2010
SP - 172
EP - 176
BT - 2010 5th International Conference on Industrial and Information Systems, ICIIS 2010
T2 - 2010 5th International Conference on Industrial and Information Systems, ICIIS 2010
Y2 - 29 July 2010 through 1 August 2010
ER -