Abstract
Location privacy has been a great concern to users who need the location based service on networked devices such as mobile phones and personal computers. Location based service usually relies on a location server, which is commonly regarded as semi-trusted or honest-but-curious. To protect user privacy their location information must be protected against the location server. We propose a protocol which captures user location privacy, while the user can still receive the requested service from a service provider, and does not reveal the user’s exact location to the location server. Our approach offers the applicability to real-world applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: GLP: a cryptographic approach for group location privacy. Comput. Commun. 35(12), 1527–1533 (2012)
Bilogrevic, I., Jadliwala, M., Joneja, V., Kalkan, K., Hubaux, J., Aad, I.: Privacy-preserving optimal meeting location determination on mobile devices. IEEE Trans. Inf. Forensics Secur. 9(7), 1141–1156 (2014)
Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 393–412. Springer, Heidelberg (2006)
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998)
Chow, C.-Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007)
Damiani, M.L., Bertino, E., Silvestri, C.: Protecting location privacy through semantics-aware obfuscation techniques. In: Trust Management II–Proceedings of IFIPTM : Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18–20, 2008, Trondheim, Norway, pp. 231–245 (2008)
Gahi, Y., Guennoun, M., Guennoun, Z., El-Khatib, K.: Privacy preserving scheme for location-based services. J. Inf. Secur. 3(2), 105–112 (2012)
Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: 25th International Conference on Distributed Computing Systems (ICDCS 2005), 6–10, June 2005 Columbus, OH, USA, pp. 620–629 (2005)
Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC, Bethesda, MD, USA, May 31–June 2, 2009, pp. 169–178 (2009)
Gentry, C., Ramzan, Z.: Single-database private information retrieval with constant communication rate. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 803–815. Springer, Heidelberg (2005)
Ghinita, G.: Private queries and trajectory anonymization: a dual perspective on location privacy. Trans. Data Priv. 2(1), 3–19 (2009)
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.-L.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008 (2008)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the First International Conference on Mobile Systems, Applications, and Services, MobiSys, San Francisco, CA, USA, 5–8 May 2003
Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Secur. Priv. 2(2), 28–34 (2004)
Hashem, T., Kulik, L.: “don’t trust anyone”: Privacy protection for location-based services. Pervasive Mob. Comput. 7(1), 44–59 (2011)
Herrmann, M., Rial, A., Díaz, C., Preneel, B.: Practical privacy-preserving location-sharing based services with aggregate statistics. In: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2014, Oxford, United Kingdom, 23–25 July, pp. 87–98 (2014)
Mokbel, M.F., Chow, C., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea, 12–15 September, pp. 763–774 (2006)
Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6–9 February 2011
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Sedenka, J., Gasti, P.: Privacy-preserving distance computation and proximity testing on earth, done right. In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2014, Kyoto, Japan, 03–06 June, pp. 99–110 (2014)
Stehlé, D., Steinfeld, R.: Faster fully homomorphic encryption. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 377–394. Springer, Heidelberg (2010)
Sun, Y., Porta, T.F.L., Kermani, P.: A flexible privacy-enhanced location-based services system framework and practice. IEEE Trans. Mob. Comput. 8(3), 304–321 (2009)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)
Teerakanok, S., Vorakulpipat, C., Kamolphiwong, S.: Anonymity preserving framework for location-based information services. In: International ACM Conference on Management of Emergent Digital EcoSystems MEDES 2010, Bangkok, Thailand, 26–29 October, pp. 107–113 (2010)
Acknowledgment
This work was supported by “Fundamental Research Funds for the Central Universities” of China (No.XDJK2016C108) and the youth fund of Southwest University (No. 20700907).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Chen, X., Mu, Y. (2016). Preserving User Location Privacy for Location-Based Service. In: Huang, X., Xiang, Y., Li, KC. (eds) Green, Pervasive, and Cloud Computing. Lecture Notes in Computer Science(), vol 9663. Springer, Cham. https://doi.org/10.1007/978-3-319-39077-2_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-39077-2_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-39076-5
Online ISBN: 978-3-319-39077-2
eBook Packages: Computer ScienceComputer Science (R0)