Journal Paper

Paper Information

video

sound

Persian Version

View:

183

Download:

0

Cites:

Information Journal Paper

Title

A NEW METHOD BASED ON FUZZY LOGIC FOR PRIVACY PROTECTION IN LOCATION BASED SERVICES

Writers

HASHEMI M. | MALEK M.R.

Pages

 Start Page 99 | End Page 108

Keywords

LOCATION BASED SERVICES (LBS)Q2

Abstract

 Location-based service is an informational service utilizing the ability to make use the location of user in a mobile network. One of the very important issues in such services is the informational PRIVACY; means restricting persons that are unknown or unknowable to others. It is obvious that the core of such problem is using user’s position unlike his/her opinion. The motivation behind this misuse is often to observe and analyze the user’s behavior, attitudes, and social situation in order to tailor special offers or advertisements for him, but sometimes it may also be with criminal intentions. Therefore there is a concept called PRIVACY. In recent years, there has been much attention to user’s anonymzing and PRIVACY protection. Fuzzy logic method is proposed in this paper as a new way to PRIVACY protection. Different levels of accuracy to determine the users' location is defined based upon their chronological context using FUZZY INFERENCE ENGINE. In order to use this method, it is necessary to classify users and to define special fuzzy rule base for each group. The employees of a company are used as an experimental group to illustrate the efficiency of proposed method. The Fuzzy rule base is formed for them and final FUZZY INFERENCE ENGINE for the users group was developed. Finally a way is recommended to express different accuracies of positioning symbolically. The results of application showed that this approach satisfies users to reveal their spatial information with favorite precision. Increase in number of fuzzy rules could cause complexity and reduce the efficiency of model for common users. The number of rules will decrease with some explanations to users. The proposed model could also be combined with other PRIVACY protection method’s like anonymizing users for higher security levels.

Cites

  • No record.
  • References

  • No record.
  • Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    File Not Exists.