Providing Privacy in Geosocial Networks
DOI:
https://doi.org/10.53555/nncse.v2i3.467Keywords:
location, social networksAbstract
Social Network providers concentrate more on profit. Users reveal their personal information and make themselves into trouble. So a framework is proposed to face the conflict between the privacy and profit. The framework that consists of Location Profiles and a venue centric profiles and decentralized approach is provided for strong privacy and also implemented in android.
References
B. Krishnamurthy and C. E. Wills, “On the leakage of personally identifiable information via online social networks,” Comput. Commun. Rev., vol. 40, no. 1, pp. 112–117, 2010.
B. Carbunar and R. Potharaju, “You unlocked the Mt. Everest badge on foursquare! countering location fraud in geosocial networks,” in Proc. 9th IEEE Int. Conf. Mobile Ad Hoc Sensor Syst. (MASS), Feb. 2012, pp. 182–190.
D. L. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Commun. ACM, vol. 24, no. 2, pp. 84–90, 1981.
M. Abe, “Universally verifiable mix-net with verification work indendent of the number of mixservers,” in Proc. EUROCRYPT, 1998, pp. 437–447.
R. Dingledine, N. Mathewson, and P. F. Syverson, “Tor: The secondgeneration onion router,” in Proc. USENIX Security Symp., 2004, pp. 303–320.
B. Carbunar, M. Rahman, J. Ballesteros, and N. Rishe, “Private location centric profiles for geosocial networks,” in Proc. 20th ACM SIGSPATIAL Int. Conf. Adv. Geograph. Inf. Syst. (GIS), 2012, pp. 458–461.
M. Rahman, J. Ballesteros, B. Carbunar, N. Rishe, and A. V. Vasilakos, “Toward preserving privacy and functionality in geosocial networks,” in Proc. 18th Int. Conf. Mobile Comput. Netw., 2013, pp. 1–3.
M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proc. MobiSys, 2003, pp. 31–42.
K. P. N. Puttaswamy and B. Y. Zhao, “Preserving privacy in locationbased mobile social applications,” in Proc. 11th Workshop Mobile Comput. Syst. Appl., New York, NY, USA, 2010, pp. 1–6.
S. Mascetti, D. Freni, C. Bettini, X. Sean Wang, and S. Jajodia, “Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies,” VLDB J., vol. 20, no. 4, pp. 541–566, Aug. 2011.
D. Freni, C. Ruiz Vicente, S. Mascetti, C. Bettini, and C. S. Jensen, “Preserving location and absence privacy in geo-social networks,” in Proc. 19th ACM CIKM, New York, NY, USA, 2010, pp. 309–318
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.