Skip to main content

Quality Enhancement of Location Based Services Through Real Time Context Aware Obfuscation Using Crowd Sourcing

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2017 (ICCSA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10409))

Included in the following conference series:

  • 2344 Accesses

Abstract

Widespread usage of Location based services (LBS) has eventually raised the concern for user’s privacy. Various privacy preserving techniques are based on the idea of forwarding cloaking area to service provider who might be untrusted party, instead of actual location of query issuer/client. For such scenarios, in which cloaking area is exploited for privacy, results of the query request are generally based on nearest distance between client and service requested. Such techniques do not include real time context which is important in determining security, accessibility, etc. of the service and enhancing service quality. In this work, a novel method, based on crowd-sourcing concept has been proposed which takes into account the real time context for determining results of query. A system consisting of real time context-aware component is coined. Real time context has been obtained through crowd-resources available in cloaking area of client. A fuzzy inference system (FIS) has been proposed which takes nearest distance and real time context parameters as input. Based on these parameters FIS generates a new rank for the service requested. This rank is the new position on the answer list for the service requested. A prototype of the proposed system is implemented. Evaluation of prototype has been done by taking feedback of 112 users about their satisfaction in the range (0–10). User feedback for the prototype is compared with feedback of other similar systems using Kruskal Wallis test for significant differences. It has been discovered that user satisfaction for proposed system stochastically dominates other prevalent systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Howe, J.: Crowdsourcing: a definition, crowdsourcing: tracking the rise of the amateur. In: Crowdsourcing: Why the Power of the Crowd is Driving the Future of Business (2006)

    Google Scholar 

  2. Alt, F., et al.: Location-based crowdsourcing: extending crowdsourcing to the real world. In: Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries. ACM (2010)

    Google Scholar 

  3. Chow, C.-Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems. ACM (2006)

    Google Scholar 

  4. Kalnis, P., et al.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719–1733 (2007)

    Article  Google Scholar 

  5. Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005). IEEE (2005)

    Google Scholar 

  6. Yiu, M.L., et al.: Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: 2008 IEEE 24th International Conference on Data Engineering. IEEE (2008)

    Google Scholar 

  7. Pingley, A., et al.: CAP: a context-aware privacy protection system for location-based services. In: 29th IEEE International Conference on Distributed Computing Systems, ICDCS 2009. IEEE (2009)

    Google Scholar 

  8. Zhang, H., et al.: CLPP: context-aware location privacy protection for location-based social network. In: 2015 IEEE International Conference on Communications (ICC). IEEE (2015)

    Google Scholar 

  9. Pournajaf, L., et al.: Spatial task assignment for crowd sensing with cloaked locations. In: 2014 IEEE 15th International Conference on Mobile Data Management, vol. 1. IEEE (2014)

    Google Scholar 

  10. Damiani, M.L., Bertino, E., Silvestri, C.: The PROBE framework for the personalized cloaking of private locations. Trans. Data Priv. 3(2), 123–148 (2010)

    MathSciNet  Google Scholar 

  11. Fawaz, K., Feng, H., Shin, K.G.: Anatomization and protection of mobile apps’ location privacy threats. In: 24th USENIX Security Symposium (USENIX Security 2015) (2015)

    Google Scholar 

  12. Ju, X., Shin, K.G.: Location privacy protection for smartphone users using quadtree entropy maps. J. Inf. Priv. Secur. 11(2), 62–79 (2015)

    Google Scholar 

  13. Eagle, N.: txteagle: mobile crowdsourcing. In: Aykin, N. (ed.) IDGD 2009. LNCS, vol. 5623, pp. 447–456. Springer, Heidelberg (2009). doi:10.1007/978-3-642-02767-3_50

    Chapter  Google Scholar 

  14. Erickson, T.: Some thoughts on a framework for crowdsourcing. In: Workshop on Crowdsourcing and Human Computation, pp. 1–4 (2011)

    Google Scholar 

  15. Liu, N.N., Zhao, M., Yang, Q.: Probabilistic latent preference analysis for collaborative filtering. In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM 2009, pp. 759–766. ACM, New York (2009)

    Google Scholar 

  16. Yang, Z., Wu, C., Liu, Y.: Locating in fingerprint space: wireless indoor localization with little human intervention. In: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking. ACM (2012)

    Google Scholar 

  17. Yan, T., et al.: mCrowd: a platform for mobile crowdsourcing. In: Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems. ACM (2009)

    Google Scholar 

  18. Nghiem, T.P., Waluyo, A.B., Taniar, D.: A pure peer-to-peer approach for kNN query processing in mobile ad hoc networks. Pers. Ubiquit. Comput. 17(5), 973–985 (2013)

    Article  Google Scholar 

  19. To, H., Ghinita, G., Shahabi, C.: A framework for protecting worker location privacy in spatial crowdsourcing. Proc. VLDB Endow. 7(10), 919–930 (2014)

    Article  Google Scholar 

  20. Hu, J., Huang, L., Li, L., Qi, M., Yang, W.: Protecting location privacy in spatial crowdsourcing. In: Cai, R., Chen, K., Hong, L., Yang, X., Zhang, R., Zou, L. (eds.) APWeb 2015. LNCS, vol. 9461, pp. 113–124. Springer, Cham (2015). doi:10.1007/978-3-319-28121-6_11

    Chapter  Google Scholar 

  21. Toch, E.: Crowdsourcing privacy preferences in context-aware applications. Pers. Ubiquit. Comput. 18(1), 129–141 (2014)

    Article  Google Scholar 

  22. Mashhadi, A.J., Capra, L.: Quality control for real-time ubiquitous crowdsourcing. In: Proceedings of the 2nd international workshop on Ubiquitous Crowdsouring. ACM (2011)

    Google Scholar 

  23. Jagwani, P., Kaushik, S.: K anonymity based on fuzzy spatio-temporal context. In: 2014 IEEE 15th International Conference on Mobile Data Management, vol. 2. IEEE (2014)

    Google Scholar 

  24. Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. TKDE 19(12), 1719–1733 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priti Jagwani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Jagwani, P., Kaushik, S. (2017). Quality Enhancement of Location Based Services Through Real Time Context Aware Obfuscation Using Crowd Sourcing. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2017. ICCSA 2017. Lecture Notes in Computer Science(), vol 10409. Springer, Cham. https://doi.org/10.1007/978-3-319-62407-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-62407-5_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-62406-8

  • Online ISBN: 978-3-319-62407-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics