Privacy-Preserving Verifiable Proximity Test for Location-Based Services

The prevalence of smartphones with geo-positioning functionalities gives rise to a variety of location-based services (LBSs). Proximity test, an important branch of location-based services, enables the LBS users to determine whether they are in a close proximity with their friends, which can be extended to numerous applications in location-based mobile social networks. Unfortunately, serious security and privacy issues may occur in the current solutions to proximity test. On the one hand, users' private location information is usually revealed to the LBS server and other users, which may lead to physical attacks to users. On the other hand, the correctness of proximity test computation results from LBS server cannot be verified in the existing schemes and thus the creditability of LBS is greatly reduced. Besides, privacy should be defined by user him/herself, not the LBS server. In this paper, we propose a privacy-preserving verifiable proximity test for location-based services. Our scheme enables LBS users to verify the correctness of proximity test results from LBS server without revealing their location information. We show the security, efficiency, and feasibility of our proposed scheme through detailed performance evaluation.

[1]  Ove Andersen,et al.  A Location Privacy Aware Friend Locator , 2009, SSTD.

[2]  Yevgeniy Vahlis,et al.  Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..

[3]  Roberto Tamassia,et al.  Authenticated hash tables , 2008, CCS.

[4]  Yuval Ishai,et al.  From Secrecy to Soundness: Efficient Verification via Secure Computation , 2010, ICALP.

[5]  Yuguang Fang,et al.  Verifiable privacy-preserving monitoring for cloud-assisted mHealth systems , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[6]  Xiaodong Lin,et al.  PLAM: A privacy-preserving framework for local-area mobile social networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[7]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[8]  Sushil Jajodia,et al.  Privacy-Aware Proximity Based Services , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[9]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[10]  Yuguang Fang,et al.  Privacy-preserving revocable content sharing in geosocial networks , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[11]  Yuguang Fang,et al.  Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[12]  Man Lung Yiu,et al.  Private and Flexible Proximity Detection in Mobile Social Networks , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[13]  Dan Boneh,et al.  Location Privacy via Private Proximity Testing , 2011, NDSS.

[14]  Haojin Zhu,et al.  Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks , 2013, IEEE Transactions on Emerging Topics in Computing.

[15]  Haojin Zhu,et al.  All your location are belong to us: breaking mobile social networks for automated user location tracking , 2013, MobiHoc '14.

[16]  D. Boneh,et al.  Encryption schemes from bilinear maps , 2007 .

[17]  Nicholas Hopper,et al.  Efficient Private Proximity Testing with GSM Location Sketches , 2012, Financial Cryptography.

[18]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[19]  Guanhua Yan,et al.  Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking , 2013, IEEE Journal on Selected Areas in Communications.

[20]  Roberto Tamassia,et al.  Optimal Verification of Operations on Dynamic Sets , 2011, CRYPTO.

[21]  Rosario Gennaro,et al.  Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..

[22]  Yao Zheng,et al.  SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags , 2012, ESORICS.

[23]  Yuguang Fang,et al.  A game-theoretic approach for achieving k-anonymity in Location Based Services , 2013, 2013 Proceedings IEEE INFOCOM.

[24]  Alfred Menezes,et al.  Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.