Arunkumar, S., Srivatsa, M. & Rajarajan, M. (2014). Location Security - Where to Enforce?. Paper presented at the IEEE MILCOM, 06-10-2014 - 08-10-2014, Baltimore, USA.
- Accepted Version
Download (3MB) | Preview
Enforcing security in location based services is very crucial in the current mobile world. Past literature has examined both location and identity obfuscation techniques in order to optimally tradeoff security/privacy with utility − this primarily addresses the ‘how to enforce location security problem’; however, it does not address the ‘where to enforce location security problem’. This paper examines the ‘where’ problem and in particular, examines tradeoffs between enforcing location security at a device vs. enforcing location security at an edge location server. This paper also sketches an implementation of location security solutions at both the device and the edge location server and presents detailed experiments using real mobility and user profile data sets collected from various data sources (taxicabs, Smartphones). Our results show that while device-based solutions do not require trust in the edge location server, they either suffer from high false positive rate (about 25% probability of not meeting the desired security requirement) or low utility (about 600 meters higher error in obfuscated location data).
|Item Type:||Conference or Workshop Item (Paper)|
|Additional Information:||© 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.|
|Subjects:||T Technology > T Technology (General)|
|Divisions:||School of Engineering & Mathematical Sciences > Engineering|
Actions (login required)
Downloads per month over past year