Location Privacy in Mobile Applications - Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang

Location Privacy in Mobile Applications (eBook)

eBook Download: PDF
2018 | 1st ed. 2018
XI, 101 Seiten
Springer Singapore (Verlag)
978-981-13-1705-7 (ISBN)
Systemvoraussetzungen
53,49 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.

Bo Liu received his B.S. degree from Nanjing University of Posts and Telecommunications, China, in 2004 and his M.S. and Ph.D. degrees in 2007 and 2010, respectively, from Shanghai Jiao Tong University, Shanghai, China, all in Electrical Engineering. From 2010 to 2014, he was an Assistant/Associate Research Professor at the Electrical Engineering Department, Shanghai Jiao Tong University. He was a postdoctoral research fellow at Deakin University, Melbourne, Australia, from 2014 to 2017. He is currently a lecturer at the Department of Engineering, La Trobe University, VIC 3086, Australia. His research interests include wireless communications and networking, security, and privacy issues in wireless networks.   

Wanlei Zhou received his B.Eng. and M.Eng. degrees from Harbin Institute of Technology, China in 1982 and 1984, respectively, and his Ph.D. degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a D.Sc. degree from Deakin University in 2002. He is currently the Head of School of school of software in University of Technology Sydney, Australia. He was an Alfred Deakin Professor and Chair of Information Technology, School of Information Technology. Professor Zhou has published more than 300 papers in refereed international journals and conference proceedings, and he has chaired numerous international conferences.   

Tianqing Zhu received her B.Eng. and M.Eng. degrees from Wuhan University, China, in 2000 and 2004, respectively, and her Ph.D. in Computer Science from Deakin University, Australia, in 2014. Dr. Zhu is currently a senior lecturer in the school of software in University of Technology Sydney, Australia. Before that, she was a lecturer in the School of Information Technology, Deakin University. Her research interests include privacy preservation, data mining and network security.
   
Yong Xiang received his B.Eng. and M.E. degrees from the University of Electronic Science and Technology of China, Chengdu, China, in 1983 and 1989, respectively. In 2003, he received his Ph.D. degree from The University of Melbourne, Australia. He is currently a Professor at the School of Information Technology at Deakin University, Melbourne, Australia. He is also the Associate Head of School (Research) and Director of the Artificial Intelligence and Data Analytics Research Cluster. His research interests include information security and privacy, multimedia (speech/image/video) processing, wireless sensor networks and IoT, and biomedical signal processing. He has authored over 160 refereed journal and conference papers in these areas. 

Kun Wang received his B. Eng. and Ph.D. degrees from the School of Computer Science, Nanjing University of Posts and Telecommunications, China, in 2004 and 2009, respectively. From 2013 to 2015, he was a postdoctoral fellow at the Electrical Engineering Department, University of California, Los Angeles (UCLA), USA. In 2016, he was a research fellow at the School of Computer Science and Engineering, the University of AIZU, Fukushima, Japan. He is currently a research fellow at the Department of Computing, Hong Kong Polytechnic University, China, and also a Full Professor at the School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China. He has published over 100 papers in refereed international conferences and journals. He is a senior member of the IEEE and a member of the ACM. His current research interests are mainly in big data, wireless communications and networking, smart grids, and information security technologies.

This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.

Bo Liu received his B.S. degree from Nanjing University of Posts and Telecommunications, China, in 2004 and his M.S. and Ph.D. degrees in 2007 and 2010, respectively, from Shanghai Jiao Tong University, Shanghai, China, all in Electrical Engineering. From 2010 to 2014, he was an Assistant/Associate Research Professor at the Electrical Engineering Department, Shanghai Jiao Tong University. He was a postdoctoral research fellow at Deakin University, Melbourne, Australia, from 2014 to 2017. He is currently a lecturer at the Department of Engineering, La Trobe University, VIC 3086, Australia. His research interests include wireless communications and networking, security, and privacy issues in wireless networks.   Wanlei Zhou received his B.Eng. and M.Eng. degrees from Harbin Institute of Technology, China in 1982 and 1984, respectively, and his Ph.D. degree from The Australian National University, Canberra, Australia, in 1991, all in Computer Science and Engineering. He also received a D.Sc. degree from Deakin University in 2002. He is currently the Head of School of school of software in University of Technology Sydney, Australia. He was an Alfred Deakin Professor and Chair of Information Technology, School of Information Technology. Professor Zhou has published more than 300 papers in refereed international journals and conference proceedings, and he has chaired numerous international conferences.   Tianqing Zhu received her B.Eng. and M.Eng. degrees from Wuhan University, China, in 2000 and 2004, respectively, and her Ph.D. in Computer Science from Deakin University, Australia, in 2014. Dr. Zhu is currently a senior lecturer in the school of software in University of Technology Sydney, Australia. Before that, she was a lecturer in the School of Information Technology, Deakin University. Her research interests include privacy preservation, data mining and network security.   Yong Xiang received his B.Eng. and M.E. degrees from the University of Electronic Science and Technology of China, Chengdu, China, in 1983 and 1989, respectively. In 2003, he received his Ph.D. degree from The University of Melbourne, Australia. He is currently a Professor at the School of Information Technology at Deakin University, Melbourne, Australia. He is also the Associate Head of School (Research) and Director of the Artificial Intelligence and Data Analytics Research Cluster. His research interests include information security and privacy, multimedia (speech/image/video) processing, wireless sensor networks and IoT, and biomedical signal processing. He has authored over 160 refereed journal and conference papers in these areas. Kun Wang received his B. Eng. and Ph.D. degrees from the School of Computer Science, Nanjing University of Posts and Telecommunications, China, in 2004 and 2009, respectively. From 2013 to 2015, he was a postdoctoral fellow at the Electrical Engineering Department, University of California, Los Angeles (UCLA), USA. In 2016, he was a research fellow at the School of Computer Science and Engineering, the University of AIZU, Fukushima, Japan. He is currently a research fellow at the Department of Computing, Hong Kong Polytechnic University, China, and also a Full Professor at the School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China. He has published over 100 papers in refereed international conferences and journals. He is a senior member of the IEEE and a member of the ACM. His current research interests are mainly in big data, wireless communications and networking, smart grids, and information security technologies.

1.        Introduction

1.1.              Definition of Location Privacy

1.2.              Location Privacy Risks: Attacks and Adversaries

1.3.              People’s View About Location Privacy

1.4.              Practical Applications with Location Privacy Issues

1.5.              The Unified Location Privacy Research Framework

1.6.              Outline and Book Overview

 

 

2.        Location Privacy Preserving Mechanisms

2.1.              Introduction

2.2.              Cryptography-based Mechanism

2.3.              Anonymization Mechanism

2.4.              Obfuscation Mechanism

2.5.              Reducing Location Information Sharing

2.6.              Location Privacy Metrics and Performance Evaluations

2.7.              Comparisons and Discussions

 

3.        Location Privacy in Mobile Social Network Applications

3.1.              Introduction

3.2.              Sensitive Location Predication by Users’ Social Network Data

3.3.              Protecting Important Locations in Social Networks

3.4.              Summary

 

4.        Location Privacy in Mobile Crowd Sensing Applications

4.1.              Introduction

4.2.              Related Works

4.3.              A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Modes

4.4.              Performance Evaluation

4.5.              Summary

 

5.        Location Privacy in Wireless Vehicular Networks

5.1.              Introduction

5.2.              Related Works

5.3.              Enhancing Privacy by Content Broadcasting and Active Caching

5.4.              Performance Evaluation

5.5.              Summary

 

 

6.        Future Directions and Conclusions

6.1.              Location Privacy Protection under Correlations

6.2.              Location Privacy in Big Data and Deep Learning Era

6.3.              Location Privacy in Autonomous Systems

6.4.              Conclusions

Erscheint lt. Verlag 30.8.2018
Reihe/Serie SpringerBriefs on Cyber Security Systems and Networks
SpringerBriefs on Cyber Security Systems and Networks
Zusatzinfo XI, 101 p. 47 illus., 46 illus. in color.
Verlagsort Singapore
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Software Entwicklung Mobile- / App-Entwicklung
Schlagworte Autonomous Systems • crowd sensing • Location Based Services • location privacy • mobile networks • vehicular networks
ISBN-10 981-13-1705-4 / 9811317054
ISBN-13 978-981-13-1705-7 / 9789811317057
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 4,0 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99