SSPA-LBS: Scalable and Social-Friendly Privacy-Aware Location-Based Services

Privacy-aware location-based service (PA-LBS) preserves LBS users’ privacy but undesirably sacrifices service quality. In order to balance the two factors with satisfactory user experience, existing frameworks are faced with two barriers, that is, scalability and social-friendliness. First, existing schemes do not enable LBS users to flexibly scale their privacy level on service provision. Such a lack of scalability easily results in either unacceptable service-quality degradation or insufficient privacy protection and fails to meet dynamic user requirements. Second, existing schemes handle privacy protection by merely considering the trust relationship between users and servers but ignore the complex trust relationships among users. As a result, users cannot preserve privacy in location-based social services that involve user-to-user interactions. In this paper, we present the first scalable and social-friendly PA-LBS system. In particular, we propose a novel camouflage algorithm with a formal privacy guarantee that enables LBS users to expose their location information by scaling two privacy related factors, that is, camouflage range and place type. Furthermore, we apply the scalable ciphertext policy attribute-based encryption algorithm to enable LBS users to effectively control the access from other users to their location information. Moreover, we also demonstrated the operational efficiency of the proposed system through successful implementations on Android devices.

[1]  Chi-Yin Chow,et al.  Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.

[2]  Marijke De Soete Attribute Certificate , 2011, Encyclopedia of Cryptography and Security.

[3]  Philippe Golle,et al.  On the Anonymity of Home/Work Location Pairs , 2009, Pervasive.

[4]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[5]  Agusti Solanas,et al.  Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism , 2007, EuroPKI.

[6]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[7]  Xing Xie,et al.  User-Service Rating Prediction by Exploring Social Users' Rating Behaviors , 2016, IEEE Transactions on Multimedia.

[8]  Rinku Dewri,et al.  Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers , 2013, IEEE Transactions on Mobile Computing.

[9]  Nitesh Saxena,et al.  Cover locations: availing location-based services without revealing the location , 2011, WPES '11.

[10]  Hua Lu,et al.  SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[11]  Igor Bisio,et al.  GPS/HPS-and Wi-Fi Fingerprint-Based Location Recognition for Check-In Applications Over Smartphones in Cloud-Based LBSs , 2013, IEEE Transactions on Multimedia.

[12]  Sabrina De Capitani di Vimercati,et al.  An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.

[13]  Luming Zhang,et al.  Fusion of Magnetic and Visual Sensors for Indoor Localization: Infrastructure-Free and More Effective , 2017, IEEE Transactions on Multimedia.

[14]  Jean-Yves Le Boudec,et al.  Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.

[15]  Tetsuji Satoh,et al.  Protection of Location Privacy using Dummies for Location-based Services , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).

[16]  Agusti Solanas,et al.  A TTP-free protocol for location privacy in location-based services , 2008, Comput. Commun..

[17]  Ying Cai,et al.  Feeling-based location privacy protection for location-based services , 2009, CCS.

[18]  Ueli Maurer,et al.  Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1994, CRYPTO.

[19]  Catuscia Palamidessi,et al.  Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.

[20]  Xiangyu Wang,et al.  Semantic-Based Location Recommendation With Multimodal Venue Semantics , 2015, IEEE Transactions on Multimedia.

[21]  Carmela Troncoso,et al.  Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.

[22]  Ja-Ling Wu,et al.  A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for K-NN Search , 2013, IEEE Transactions on Information Forensics and Security.

[23]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[24]  Chang Wen Chen,et al.  Attribute-based multi-dimension scalable access control for social media sharing , 2016, 2016 IEEE International Conference on Multimedia and Expo (ICME).

[25]  Hui Zang,et al.  Anonymization of location data does not work: a large-scale measurement study , 2011, MobiCom.

[26]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[27]  Chang Wen Chen,et al.  Nearby Friend Discovery with Geo-indistinguishability to Stalkers , 2014, FNC/MobiSPC.

[28]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[29]  Catuscia Palamidessi,et al.  Optimal Geo-Indistinguishable Mechanisms for Location Privacy , 2014, CCS.

[30]  Panos Kalnis,et al.  Providing K-Anonymity in location based services , 2010, SKDD.