Ph.D. Dissertation
The exponential growth of computing power, memory and networking speed in wireless mobile devices has created a huge number of opportunities for businesses, service providers, and end users. This is because centralized, clustered business components are even more pushed in mobile devices or sensor devices. These devices are equipped with geographical location based applications, and hence location information is not only applicable for a human being but also for all moving objects such as vehicles, animals, or indirectly moving information technology resources.
Privacy threats due to electronics use in our lives are discussed in last few decades, but location privacy of moving objects emerged as a significant concern in last decade. Location privacy has multiple dimensions such as political, social, commercial and technical.
Control over access to location, the inference of location and misuse of location is a major concern in public domain applications than in private domain location based applications. Camera surveillance, Link layer, Network Layer, Location based service providers, Mobile network operators, Time based tracking, Space based tracking and malicious attackers are the threats origins of location privacy.
So far, there are some ways of protection in the form of K-anonymity, Spatial Cloaking, False Location, Aliasing, Access control, Signatures and Transformational cloaking.
Recently more focus is given on peer to peer, distributed and multi-tier models to protect location privacy. We have designed and developed advanced and novel techniques such as client side privacy with caching techniques, persistency based peer to peer model of privacy, dynamic parameters broadcast model of privacy, the third dimension (3D positioning) objects privacy model, trusted server based controlled broadcast privacy and personalized privacy with its management. Client side cloaking techniques along with cache buffering (for Points of Interests) are introduced to achieve a balancebetweenprivacy and performance. In another model of peer to peer privacy, backed by registered POI server, prototype proves that method provides privacy as the query is sent to nearby peer device which has local POI know how, where these persistent nodes will cache POIs in there devices. Dynamic cloaking is experimented to enhance efficiency. Dynamic cloaking considers mobile users speed and direction on the road along with 3D POI entities which show that more relevant and promising mobile nodes participate in the cloaking process. As compared to earlier objects monitoring in 2D, we designed and simulated 3D object monitoring system for privacy. We converted 2D space algorithm to 3D object monitoring algorithm of cloaking. Containment resolution algorithm is devised to improve performance which shows a promising method to balance the privacy of monitored objects. In another experiment, we have achieved privacy of mobile users by a limited broadcasting method whereby POI and mobile users directly interact for the query. Here trusted architecture along with broadcast tradeoff plays an important role for privacy. We have developed these mechanisms and protocols for the protection of location privacy, but the balance will play a major role as far as quality, performance and resource utilization is concerned.
If you are inclined to achieve more privacy, there is a degradation of regulations and resultant quality of location based applications. Commercial interests and political interests will have upper hand as compared to technical challenges, social interests, and legal challenges, to control the privacy.