A TTP-free protocol for location privacy in location-based services

Location-based services (LBS) will be a keystone of the new information society that is founded on the information and communications technologies (ICTs). Mobile devices such as cell phones or laptops have become ubiquitous. They are equipped with a variety of localisation systems that make them proper for making use of the new LBS. Most of the times, these services are provided by a trusted company (e.g. a telecommunications company). However, the massive use of mobile devices pave the way for the creation of ad hoc wireless networks that can be used to exchange information based on locations. When the exchange of location information is done amongst untrusted parties, the privacy of the participants could be in jeopardy. In this paper we present a novel solution that guarantees the privacy of the users of LBS. Our technique is built up of several modules that progressively increase the privacy level of the users. Unlike the existing approaches, our proposal does not rely on a trusted third party (TTP) to anonymise the users and to guarantee their location privacy.

[1]  Josep Domingo-Ferrer,et al.  A polynomial-time approximation to optimal multivariate microaggregation , 2008, Comput. Math. Appl..

[2]  Marco Gruteser,et al.  USENIX Association , 1992 .

[3]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[4]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[5]  Henning Schulzrinne,et al.  The IETF Geopriv and Presence Architecture Focusing on Location Privacy , 2006 .

[6]  Allison Woodruff,et al.  Making space for stories: ambiguity in the design of personal communication systems , 2005, CHI.

[7]  Agusti Solanas,et al.  Privacy Protection in Location-Based Services Through a Public-Key Privacy Homomorphism , 2007, EuroPKI.

[8]  Malcolm David Macnaughtan,et al.  Positioning GSM telephones , 1998, IEEE Commun. Mag..

[9]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[10]  Yu Zhang,et al.  Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.

[11]  Robert Cole,et al.  Computer Communications , 1982, Springer New York.

[12]  Panos Kalnis,et al.  PRIVE: anonymous location-based queries in distributed mobile systems , 2007, WWW '07.

[13]  P. Georgiadis,et al.  A survey of several cooperation enforcement schemes for MANETs , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[14]  Tatsuaki Okamoto,et al.  A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.

[15]  Mohamed Mokbel,et al.  Challenges in Preserving Location Privacy in Peer-to-Peer Environments , 2006, 2006 Seventh International Conference on Web-Age Information Management Workshops.

[16]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[17]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[18]  Mohamed F. Mokbel,et al.  Towards Privacy-Aware Location-Based Database Servers , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).