Preserving User Location Privacy for Location-Based Service

Location privacy has been a great concern to users who need the location based service on networked devices such as mobile phones and personal computers. Location based service usually relies on a location server, which is commonly regarded as semi-trusted or honest-but-curious. To protect user privacy their location information must be protected against the location server. We propose a protocol which captures user location privacy, while the user can still receive the requested service from a service provider, and does not reveal the user’s exact location to the location server. Our approach offers the applicability to real-world applications.

[1]  Gabriel Ghinita Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy , 2009, Trans. Data Priv..

[2]  Chi-Yin Chow,et al.  Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.

[3]  Thomas F. La Porta,et al.  A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice , 2009, IEEE Transactions on Mobile Computing.

[4]  Jean-Pierre Hubaux,et al.  Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices , 2014, IEEE Transactions on Information Forensics and Security.

[5]  Ron Steinfeld,et al.  Faster Fully Homomorphic Encryption , 2010, ASIACRYPT.

[6]  Dan Boneh,et al.  Location Privacy via Private Proximity Testing , 2011, NDSS.

[7]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[8]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[9]  Tanzima Hashem,et al.  "Don't trust anyone": Privacy protection for location-based services , 2011, Pervasive Mob. Comput..

[10]  Bart Preneel,et al.  Practical privacy-preserving location-sharing based services with aggregate statistics , 2014, WiSec '14.

[11]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[12]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[13]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[14]  Marco Gruteser,et al.  Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.

[15]  Chalee Vorakulpipat,et al.  Anonymity preserving framework for location-based information services , 2010, MEDES.

[16]  Khalil El-Khatib,et al.  Privacy Preserving Scheme for Location-Based Services , 2012, J. Information Security.

[17]  Yu Zhang,et al.  Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.

[18]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[19]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[20]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.