Abstract
Since location information is considered as personal information, location privacy has been emerged as one of the most important security concerns. In this paper, we enhance the ‘Share The Secret’ (STS) scheme, a privacy mechanism that segments location information into pieces (shares), distributes the shares to multiple untrustworthy location servers, and reconstructs the original location on authorized entities. We introduce certain policies based on the theory of optimal stopping in order to achieve time-optimized decisions for different levels of privacy. Moreover, we evaluate the performance of STS in terms of communication and computation load, and energy consumption. Experimental results quantify the benefits stemming for STS adoption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Marias, G.F., Delakouridis, C., Kazatzopoulos, L., Georgiadis, P.: Location Privacy Through Secret Sharing Techniques. In: 1st IEEE International Workshop on Trust, Security and Privacy for Ubiquitous Computing, TSPUC 2005, Taormina, Italy, pp. 614–620 (June 2005)
Ben-Or, M., Goldwasser, S., Wigderson, A.: ‘Completeness theorems for non-cryptographic fault-tolerant distributed computations’. In: Proc. of the 20th ACM Symp. on the Theory of Computing, pp. 1–10 (1988)
Peskir, G., Shiryaev, A.: Optimal Stopping and Free Boundary Problems (ETH Zuerich). Birkhäuser (2006)
Fasbender, A., Kesdogan, D., Kubitz, O.: Analysis of Security and Privacy in Mobile IP. In: Proc. 4th International Conf. on Telecommunication Systems, Modeling and Analysis (1996)
Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, D., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: Proc. International Conf. of Distributed Computing Systems (2002)
Friday, A., Muller, H., Rodden, T., Dix, A.: A Lightweight Approach to Managing Privacy in Location-Based Services. In: Proc. Equator Annual Conference (October 2002)
Beresford, A.R., Stajano, F.: Mix zones: User privacy in location-aware services. In: PerCom Workshops 2004, pp. 127–131 (2004)
Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47–60. Springer, Heidelberg (2007)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of MobiSys 2003, pp. 31–42 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Delakouridis, C., Anagnostopoulos, C. (2013). On Enhancement of ‘Share The Secret’ Scheme for Location Privacy. In: Accorsi, R., Ranise, S. (eds) Security and Trust Management. STM 2013. Lecture Notes in Computer Science, vol 8203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41098-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-41098-7_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41097-0
Online ISBN: 978-3-642-41098-7
eBook Packages: Computer ScienceComputer Science (R0)