Captcha Your Location Proof - A Novel Method for Passive Location Proofs in Adversarial Environments

A large number of online rating and review platforms allow users to exchange their experiences with products and locations. These platforms need to implement appropriate mechanisms to counter malicious content, such as contributions which aim at either wrongly accrediting or discrediting some product or location. For ratings and reviews of locations, the aim of such a mechanism is to ensure that a user actually was at said location, and did not simply post a review from another, arbitrary location. Existing solutions usually require a costly infrastructure, need proof witnesses to be co-located with users, or suggest schemes such as users taking pictures of themselves at the location of interest. This paper introduces a method for location proofs based on visual features and image recognition, which is cheap to implement yet provides a high degree of security and tamper-resistance without placing a large burden on the user.

[1]  Guohong Cao,et al.  APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.

[2]  John Langford,et al.  CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.

[3]  David Chaum,et al.  Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.

[4]  Michael L. Anderson,et al.  Learning from the Crowd: Regression Discontinuity Estimates of the Effects of an Online Review Database , 2012 .

[5]  Srdjan Capkun,et al.  Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars , 2010, NDSS.

[6]  Qun Li,et al.  Location Proof via Passive RFID Tags , 2012, WASA.

[7]  Prasant Mohapatra,et al.  STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users , 2016, IEEE/ACM Transactions on Networking.

[8]  David G. Lowe,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.

[9]  Wei Chen,et al.  The influence of user-generated content on traveler behavior: An empirical investigation on the effects of e-word-of-mouth to hotel online bookings , 2011, Comput. Hum. Behav..

[10]  Sanjay Jha,et al.  I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).

[11]  Vanessa De Luca,et al.  A Taxonomy of Motivational Affordances for Meaningful Gamified and Persuasive Technologies , 2015, EnviroInfo/ICT4S.

[12]  Urs Hengartner,et al.  VeriPlace: a privacy-aware location proof architecture , 2010, GIS '10.

[13]  Ragib Hasan,et al.  'Who, When, and Where?' Location Proof Assertion for Mobile Devices , 2014, DBSec.

[14]  Sanjay Jha,et al.  Poster: Were You in the Cafe Yesterday?: Location Proof Generation & Verification for Mobile Users , 2015, SenSys.

[15]  Matthew A. Brown,et al.  Automatic Panoramic Image Stitching using Invariant Features , 2007, International Journal of Computer Vision.

[16]  Simon Scheider,et al.  A Model and Framework for Matching Complementary Spatio-Temporal Needs , 2017, SIGSPATIAL/GIS.

[17]  Reza Curtmola,et al.  Improving location reliability in crowd sensed data with minimal efforts , 2013, 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC).

[18]  Dina Mayzlin,et al.  Promotional Reviews: An Empirical Investigation of Online Review Manipulation , 2012 .

[19]  Alec Wolman,et al.  Enabling new mobile applications with location proofs , 2009, HotMobile '09.

[20]  Ling Liu,et al.  Fraud Detection in Online Consumer Reviews , 2008, Decis. Support Syst..

[21]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[22]  H. Miller A MEASUREMENT THEORY FOR TIME GEOGRAPHY , 2005 .

[23]  Wang Jun,et al.  Privacy-preserving distributed location proof generating system , 2016, China Communications.