Affiliation:
1. Ionian University, Greece
Abstract
Current research in location-based services (LBSs) highlights the importance of cryptographic primitives in privacy preservation for LBSs, and presents solutions that attempt to support the (apparently) mutually exclusive requirements for access control and context privacy (i.e., identity and/or location), while at the same time adopting more conservative assumptions in order to reduce or completely remove the need for trust on system entities (e.g., the LBS provider, the network operator, or other peer nodes). This paper surveys the current state of knowledge concerning the use of cryptographic primitives for privacy-preservation in LBS applications.
Reference104 articles.
1. Al-Muhtadi, J., Hill, R., Campbell, R., & Mickunas, M. (2006). Context and location-aware encryption for pervasive computing environments. In Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops (pp. 283-288). Washington, DC: IEEE Computer Society.
2. Privacy-enhanced location-based access control;C. A.Ardagna;The handbook of database security: Applications and trends,2007
3. Ardagna, C. A., Cremonini, M., Capitani di Vimercati, S. D., & Samarati, P. (2009). Access control in location-based services. In C. Bettini, S. Jajodia, P. Samarati, & X. S. Wang (Eds.), Proceedings of Research Issues and Emerging Trends in Privacy in Location-Based Applications (LNCS 5599, pp. 106-126).
4. Ardagna, C. A., Jajodia, S., Samarati, P., & Stavrou, A. (2009). Privacy preservation over untrusted mobile networks. In C. Bettini, S. Jajodia, P. Samarati, & X. S. Wang (Eds.), Proceedings of Research Issues and Emerging Trends in Privacy in Location Based Applications (LNCS 5599, pp. 84-105).
5. Atallah, M., Blanton, M., & Frikken, K. (2007). Efficient techniques for realizing geo-spatial access control. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (pp. 82-92). New York, NY: ACM Press.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献