[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2069131.2069147acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

A privacy preserving system for friend locator applications

Published: 31 October 2011 Publication History

Abstract

One interesting application of online social networks is the friend locator, in which the application server informs users through mobile devices if their listed friends are nearby in terms of geographical locations. However, in such services, it is challenging to protect the privacy of an individual user. Previous privacy protection solutions for friend locators do not guarantee a high level of privacy and maintain efficiency. In this paper, we propose a privacy preserving system to guarantee both strong privacy and efficiency. Additionally, we use the polygon decomposition method to achieve both accuracy and flexibility especially for irregular areas of interest. Finally, through numerical analysis and simulation, we show that the proposed system and algorithm can achieve high privacy, efficiency, accuracy and flexibility.

References

[1]
M. J. Atallah and W. Du. Secure multi-party computational geometry. In Proceedings of the 7th International Workshop on Algorithms and Data Structures, WADS'01, pages 165--179, 2001.
[2]
D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24:84--90, February 1981.
[3]
W. Du and Z. Zhan. A practical approach to solve secure multi-party computation problems. In IN NEW SECURITY PARADIGMS WORKSHOP, pages 127--135, 2002.
[4]
B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In Distributed Computing Systems, 2005. ICDCS 2005. Proceedings. 25th IEEE International Conference on, pages 620--629, june 2005.
[5]
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In Proceedings of the nineteenth annual ACM symposium on Theory of computing, STOC '87, pages 218--229, 1987.
[6]
D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM, 42:39--41, 1999.
[7]
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys, pages 31--42, 2003.
[8]
G. Kφien and V. Oleshchuk. Location privacy for cellular systems; analysis and solution. In Privacy Enhancing Technologies, volume 3856 of Lecture Notes in Computer Science, pages 40--58. Springer Berlin / Heidelberg, 2006.
[9]
M. Liskov, R. L. Rivest, and D. Wagner. Tweakable block ciphers. In CRYPTO'02, pages 31--46, 2002.
[10]
J. Manweiler, R. Scudellari, Z. Cancio, and L. P. Cox. We saw each other on the subway: secure, anonymous proximity-based missed connections. In Proceedings of the 10th workshop on Mobile Computing Systems and Applications, HotMobile '09, pages 1:1--1:6, 2009.
[11]
S. Mascetti, C. Bettini, and D. Freni. Longitude: Centralized privacy-preserving computation of users' proximity. In Proceedings of the 6th VLDB Workshop on Secure Data Management, SDM '09, pages 142--157, 2009.
[12]
S. Mascetti, C. Bettini, D. Freni, X. S. Wang, and S. Jajodia. Privacy-aware proximity based services. In Mobile Data Management, pages 31--40. IEEE Computer Society, 2009.
[13]
S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia. On the impact of user movement simulations in the evaluation of lbs privacy-preserving techniques. In the 1st International Workshop on Privacy in Location-Based Applications, 2008.
[14]
M. F. Mokbel, C. yin Chow, and W. G. Aref. The new casper: Query processing for location services without compromising privacy. In VLDB, pages 763--774, 2006.
[15]
L. Siksnys, J. R. Thomsen, S. Saltenis, and M. L. Yiu. Private and flexible proximity detection in mobile social networks. In Mobile Data Management'10, pages 75--84, 2010.
[16]
D. Stehle and R. Steinfeld. Faster fully homomorphic encryption. Cryptology ePrint Archive, Report 2010/299, 2010. http://eprint.iacr.org/.
[17]
L. Šikšnys, J. R. Thomsen, S. Šaltenis, M. L. Yiu, and O. Andersen. A location privacy aware friend locator. In Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases, SSTD '09, pages 405--410, 2009.
[18]
A. C. Yao. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS '82, pages 160--164, 1982.
[19]
G. Zhong, I. Goldberg, and U. Hengartner. Louis, lester and pierre: three protocols for location privacy. In Proceedings of the 7th international conference on Privacy enhancing technologies, PET'07, pages 62--76, 2007.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiWac '11: Proceedings of the 9th ACM international symposium on Mobility management and wireless access
October 2011
218 pages
ISBN:9781450309011
DOI:10.1145/2069131
  • General Chair:
  • Jose Rolim,
  • Program Chairs:
  • Jun Luo,
  • Sotiris Nikoletseas
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 October 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. convex polygon
  2. friend locator
  3. privacy preserving

Qualifiers

  • Research-article

Conference

MSWiM '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 83 of 272 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 120
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media