Novel techniques for location-cloaked applications

dc.contributor.advisor Ying Cai Galdames-Sepulveda, Patricio
dc.contributor.department Computer Science 2018-08-11T15:34:22.000 2020-06-30T02:45:47Z 2020-06-30T02:45:47Z Sun Jan 01 00:00:00 UTC 2012 2013-06-05 2012-01-01
dc.description.abstract <p>Location cloaking has been shown to be cost-effective in mitigating location privacy and safety risks. This strategy, however, has significant impact on the applications that rely on location information. They may suffer efficiency loss; some may not even work with reduced location resolution. This research investigates two problems. 1) How to process location-cloaked queries. Processing such queries incurs significant more workload for both server and client. While the server needs to retrieve more query results and transmit them to the client, the client downloading these results wastes its battery power because most of them are useless. To address these problems, we propose a suite of novel techniques including query decomposition, scheduling, and personalized air indexing. These techniques are integrated into a single unified platform that is capable of handling various types of queries. 2) How a node V can verify whether or not another node P indeed locates in a cloaking region it claims. This problem is challenging due to the fact that the process of location verification may allow V to refine P's location within the region. We identify two types of attacks, transmission coverage attack and distance bounding attack. In the former, V refines a cloaking region by adjusting its transmission range to partially overlap with the region, whereas in the latter, by measuring the round trip time of its communication with P. We present two corresponding counter strategies, and built on top of them, propose a novel technique that allows P to participate in location verification while providing a certain level of guarantee that its cloaking region will not be refined during the process.</p>
dc.format.mimetype application/pdf
dc.identifier archive/
dc.identifier.articleid 3882
dc.identifier.contextkey 4188200
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath etd/12875
dc.language.iso en
dc.source.bitstream archive/|||Fri Jan 14 19:32:00 UTC 2022
dc.subject.disciplines Computer Engineering
dc.subject.disciplines Computer Sciences
dc.subject.keywords Location Based Services
dc.subject.keywords Location-cloaked Queries
dc.subject.keywords Location Privacy
dc.subject.keywords Location Safety
dc.subject.keywords Location Verification
dc.title Novel techniques for location-cloaked applications
dc.type article
dc.type.genre dissertation
dspace.entity.type Publication
relation.isOrgUnitOfPublication f7be4eb9-d1d0-4081-859b-b15cee251456 dissertation Doctor of Philosophy
Original bundle
Now showing 1 - 1 of 1
858.58 KB
Adobe Portable Document Format