DocumentCode :
2288506
Title :
Matlock: A location obfuscation technique for accuracy-restricted applications
Author :
Wightman, Pedro M. ; Jimeno, Miguel A. ; Jabba, Daladier ; Labrador, Miguel
Author_Institution :
Dept. de Ingeniera de Sist., Univ. del Norte, Barranquilla, Colombia
fYear :
2012
fDate :
1-4 April 2012
Firstpage :
1829
Lastpage :
1834
Abstract :
Location-based information systems (LBIS) have shown growth in the last years thanks to the popularization of cheap GPS-enabled mobile devices with connectivity to the Internet. At the same time, users have made their locations more available than ever, representing a major privacy problem, as attackers could easily determine their victims´ common paths or actual locations. As a result, some techniques have been designed to protect the users´ private information while allowing Location Based Service systems (LBS) to continue growing. Location obfuscation is a technique that alters, substitutes, or generalizes the real location of the users to protect them against malicious attacks. Moreover, there are activities that require a high level of accuracy while also maintaining the protection of the location, such as fleet management or transportation of valuables. In this work, a light-weight and fully reversible location obfuscation technique named Matlock is presented. Matlock, based on matrix obfuscation, requires low computation per operation and hides the location in both spatial and temporal dimensions. The performance evaluation shows how this technique alters the location of paths from different geographical regions, produces a non-morphologically similar path to the original path, and generates increasing distance functions between the original and the obfuscated paths, which together should reduce the probability of using estimation techniques to perform deobfuscation of the information.
Keywords :
Global Positioning System; information systems; telecommunication security; GPS-enabled mobile devices; Internet; LBIS; LBS; Matlock; accuracy-restricted applications; attackers; deobfuscation; estimation techniques; fleet management; location based service systems; location obfuscation; location obfuscation technique; location-based information systems; malicious attacks; nonmorphologically similar path; performance evaluation; privacy problem; reversible location obfuscation technique; Accuracy; Internet; Mobile handsets; Noise; Performance evaluation; Privacy; Trajectory; Location-based systems; matrix transformation; privacy; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications and Networking Conference (WCNC), 2012 IEEE
Conference_Location :
Shanghai
ISSN :
1525-3511
Print_ISBN :
978-1-4673-0436-8
Type :
conf
DOI :
10.1109/WCNC.2012.6214082
Filename :
6214082
Link To Document :
بازگشت