Novel techniques for location-cloaked applications

dc.contributor.advisor Ying Cai
dc.contributor.author Galdames-Sepulveda, Patricio
dc.contributor.department Computer Science
dc.date 2018-08-11T15:34:22.000
dc.date.accessioned 2020-06-30T02:45:47Z
dc.date.available 2020-06-30T02:45:47Z
dc.date.copyright Sun Jan 01 00:00:00 UTC 2012
dc.date.embargo 2013-06-05
dc.date.issued 2012-01-01
dc.description.abstract <p>Location cloaking has been shown to be cost-effective in mitigating location privacy and safety risks. This strategy, however, has significant impact on the applications that rely on location information. They may suffer efficiency loss; some may not even work with reduced location resolution. This research investigates two problems. 1) How to process location-cloaked queries. Processing such queries incurs significant more workload for both server and client. While the server needs to retrieve more query results and transmit them to the client, the client downloading these results wastes its battery power because most of them are useless. To address these problems, we propose a suite of novel techniques including query decomposition, scheduling, and personalized air indexing. These techniques are integrated into a single unified platform that is capable of handling various types of queries. 2) How a node V can verify whether or not another node P indeed locates in a cloaking region it claims. This problem is challenging due to the fact that the process of location verification may allow V to refine P's location within the region. We identify two types of attacks, transmission coverage attack and distance bounding attack. In the former, V refines a cloaking region by adjusting its transmission range to partially overlap with the region, whereas in the latter, by measuring the round trip time of its communication with P. We present two corresponding counter strategies, and built on top of them, propose a novel technique that allows P to participate in location verification while providing a certain level of guarantee that its cloaking region will not be refined during the process.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/etd/12875/
dc.identifier.articleid 3882
dc.identifier.contextkey 4188200
dc.identifier.doi https://doi.org/10.31274/etd-180810-2881
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath etd/12875
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/27064
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/etd/12875/GaldamesSepulveda_iastate_0097E_13161.pdf|||Fri Jan 14 19:32:00 UTC 2022
dc.subject.disciplines Computer Engineering
dc.subject.disciplines Computer Sciences
dc.subject.keywords Location Based Services
dc.subject.keywords Location-cloaked Queries
dc.subject.keywords Location Privacy
dc.subject.keywords Location Safety
dc.subject.keywords Location Verification
dc.title Novel techniques for location-cloaked applications
dc.type article
dc.type.genre dissertation
dspace.entity.type Publication
relation.isOrgUnitOfPublication f7be4eb9-d1d0-4081-859b-b15cee251456
thesis.degree.level dissertation
thesis.degree.name Doctor of Philosophy
File
Original bundle
Now showing 1 - 1 of 1
Name:
GaldamesSepulveda_iastate_0097E_13161.pdf
Size:
858.58 KB
Format:
Adobe Portable Document Format
Description: