Privacy Protection in Location Based Service by Secure Computation

Mobile devices with Global Positioning System enable various kinds of location information searches using location based services (LBS). Location information and query contents of searchers are privacy information. Privacy protection requires to hide location information and query contents of searchers from not only third parties such as eavesdroppers but also location database servers which answer queries. This paper focuses on privacy protection in nearest neighbor search. There are several researches of secure computation in nearest neighbor search for other than LBS. This paper proposes a new method of privacy protection in LBS. The method is based on Asymmetric Scalar-product Preserving Encryption. This paper also shows that the proposed method is faster and more secure than conventional privacy protection methods in LBS.

[1]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[2]  Osmar R. Zaïane,et al.  Privacy Preserving Clustering by Data Transformation , 2010, J. Inf. Data Manag..

[3]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[4]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[5]  KwangJin Park,et al.  A Privacy-Preserving Continuous Location Monitoring System for Location-Based Services , 2015, Int. J. Distributed Sens. Networks.

[6]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[7]  Min Chen,et al.  Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services , 2018, IEEE Transactions on Mobile Computing.

[8]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[9]  Tsuyoshi Takagi,et al.  Secure k-NN query on encrypted cloud database without key-sharing , 2013, Int. J. Electron. Secur. Digit. Forensics.

[10]  Ling Liu,et al.  MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[11]  Nikos Mamoulis,et al.  Secure kNN computation on encrypted databases , 2009, SIGMOD Conference.

[12]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[13]  Marco Gruteser,et al.  USENIX Association , 1992 .