ABSTRACT

This chapter provides an overview of the context of fifth generation (5G)-enabled location-based services (LBSs) and the privacy threats in LBSs and describes the general architecture LBS privacy-preserving techniques (LPPT). The centralized architecture consists of mobile users, trusted server, and the LBS server. The trusted server collects users’ queries and protects users’ privacy through privacy-preserving algorithms, and thereafter sends protected queries to the LBS server. The chapter presents the taxonomy of LPPT and reviews several typical works in each category of the existing LPPT. Rule protocol–based LPPT prevent an untrusted LBS server from accessing, storing, and using users’ location information through regulatory strategies. The private information retrieval protocol was first applied to outsourcing data in access networks that allow a user to retrieve an item in private from a server of a database without revealing which item is retrieved. The chapter discusses new challenges and future research topics.