A review paper on preserving privacy in mobile environments

Rajarajan, M. (2015). A review paper on preserving privacy in mobile environments. Journal of Computer Networks and Applications, 53, pp. 74-90. doi: 10.1016/j.jnca.2015.01.008

[img]
Preview
PDF - Accepted Version
Download (1MB) | Preview

Abstract

Technology is improving day-by-day and so is the usage of mobile devices. Every activity that would involve manual and paper transactions can now be completed in seconds using your fingertips. On one hand, life has become fairly convenient with the help of mobile devices, whereas on the other hand security of the data and the transactions occurring in the process have been under continuous threat. This paper, re-evaluates the different policies and procedures used for preserving the privacy of sensitive data and device location.. Policy languages have been very vital in the mobile environments as they can be extended/used significantly for sending/receiving any data. In the mobile environment users always go to service providers to access various services. Hence, communications between the service providers and mobile handsets needs to be secured. Also, the data access control needs to be in place. A section of this paper will review the communication paths and channels and their related access criteria. This paper is a contribution to the mobile domain, showing the possible attacks related to privacy and the various mechanisms used to preserve the end-user privacy. In addition, it also gives acomparison of the different privacy preserving methods in mobile environments to provide guidance to the readers. Finally, the paper summarises future research challenges in the area of privacy preservation. This paper examines the ‘where’ problem and in particular, examines tradeoffs between enforcing location security at a device vs. enforcing location security at an edge location server. This paper also sketches an implementation of location security solution at both the device and the edge location server and presents detailed experiments using real mobility and user profile data sets collected from multiple data sources (taxicabs, Smartphones).

Item Type: Article
Additional Information: NOTICE: this is the author’s version of a work that was accepted for publication in Journal of Computer Networks and Applications. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Journal of Computer Networks and Applications, #53 (2015) 10.1016/j.jnca.2015.01.008
Subjects: Q Science > QA Mathematics
Divisions: School of Engineering & Mathematical Sciences
URI: http://openaccess.city.ac.uk/id/eprint/8679

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics