{"title":"基于位置服务的隐私协议研究","authors":"Crystal Williams, H. Chi","doi":"10.1145/2885990.2886005","DOIUrl":null,"url":null,"abstract":"Location-based services greatly enrich our mobility experiences; it also comes along with privacy concerns, as a location-based service provider can now continuously track the location of a user. Although many privacy protocols have been proposed to address the privacy issues, there has not been much comprehensive study and comparison of those protocols. In this paper, the investigation is on the privacy models for location-based services. The focus of these studies is on the security issues on location-based service. The recently proposed protocols identify location-based services and compare them with well-designed benchmarks. In addition, performance analyses for each individual protocol are discussed in this paper.","PeriodicalId":236418,"journal":{"name":"Proceedings of the 2015 Information Security Curriculum Development Conference","volume":"499 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An investigation of privacy protocols in location-based service\",\"authors\":\"Crystal Williams, H. Chi\",\"doi\":\"10.1145/2885990.2886005\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Location-based services greatly enrich our mobility experiences; it also comes along with privacy concerns, as a location-based service provider can now continuously track the location of a user. Although many privacy protocols have been proposed to address the privacy issues, there has not been much comprehensive study and comparison of those protocols. In this paper, the investigation is on the privacy models for location-based services. The focus of these studies is on the security issues on location-based service. The recently proposed protocols identify location-based services and compare them with well-designed benchmarks. In addition, performance analyses for each individual protocol are discussed in this paper.\",\"PeriodicalId\":236418,\"journal\":{\"name\":\"Proceedings of the 2015 Information Security Curriculum Development Conference\",\"volume\":\"499 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2015 Information Security Curriculum Development Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2885990.2886005\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2015 Information Security Curriculum Development Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2885990.2886005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An investigation of privacy protocols in location-based service
Location-based services greatly enrich our mobility experiences; it also comes along with privacy concerns, as a location-based service provider can now continuously track the location of a user. Although many privacy protocols have been proposed to address the privacy issues, there has not been much comprehensive study and comparison of those protocols. In this paper, the investigation is on the privacy models for location-based services. The focus of these studies is on the security issues on location-based service. The recently proposed protocols identify location-based services and compare them with well-designed benchmarks. In addition, performance analyses for each individual protocol are discussed in this paper.