Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A frequency based sighting blurring algorithm for use with location based services on the Internet
Dunne C., Candebat T., Gray D.  Human computer interaction with mobile devices and services (Proceedings of the 10th International Conference on Human Computer Interaction With Mobile Devices and Services, Amsterdam, The Netherlands, Sep 2-5, 2008)3-12.2008.Type:Proceedings
Date Reviewed: Nov 17 2008

Location-based services (LBS) are gaining importance due to the advances in localization techniques and mobile communications. However, if they want to become a true success, they must guarantee the location privacy of their clients. To do so, trusted third parties are used, most of the time, to mediate between an LBS user and a provider, so that the former remains hidden from the latter.

Dunne et al. describe a location-blurring algorithm that aims to improve the privacy of its users, by reducing the accuracy of their locations. In this approach, simple squared areas represent users’ locations; the proposed algorithm reduces the accuracy of locations by increasing the size of the areas containing real locations. As a result, the uncertainty that an external observer has about the real location of a user is also increased.

The most interesting part of the paper, although not its main part, is its architecture. Instead of defining mobile users, LBS providers, and static targets, the authors consider mobile users as the targets of requesters (that is, other users). So, in this special architecture, a trusted middleware does not hide the real locations of requesters from LBS providers, but those of mobile targets from requesters.

Although the paper is well written and very easy to understand, the contribution is not very relevant because similar obfuscation algorithms have been proposed in the past. The lack of experimental results and the weakness of the attack model (for example, collusions are not considered) might raise some doubts about the resiliency of the proposal.

In conclusion, the paper points out an interesting research line, but there is still a long way to go to end up with a complete solution.

Reviewer:  Agusti Solanas Review #: CR136246 (1004-0410)
Bookmark and Share
  Editor Recommended
Featured Reviewer
 
 
Data Sharing (H.3.5 ... )
 
 
Information Hiding (D.2.11 ... )
 
 
Privacy (K.4.1 ... )
 
 
Software Architectures (D.2.11 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Sharing": Date
Issues in online database searching
Tenopir C., Libraries Unlimited, Inc., Englewood, CO, 1989. Type: Book (9789780872877092)
Aug 1 1990
Sharing scientific data
Sterling T., Weinkam J. Communications of the ACM 33(9): 112-119, 1990. Type: Article
Mar 1 1991
Data caching issues in an information retrieval system
Alonso R., Barbara D., Garcia-Molina H. ACM Transactions on Database Systems 15(3): 359-384, 1990. Type: Article
Mar 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy