Towards Privacy-Preserving Location Sharing over Mobile Online Social Networks

Location sharing services have recently gained momentum over mobile online social networks (mOSNs), seeing the increasing popularity of GPS-capable mobile devices such as smart phones. Despite the convenience brought by location sharing, there comes severe privacy risks. Though many efforts have been made to protect user privacy during location sharing, many of them rely on the extensive deployment of trusted Cellular Towers (CTs) and some incur excessive time overhead. More importantly, little research so far can support complete privacy including location privacy, identity privacy and social relation privacy. We propose SAM, a new System Architecture for mOSNs, and P3S, a PrivacyPreserving Protocol based on SAM, to address the above issues for privacypreserving location sharing over mOSNs. SAM and P3S differ from previous work in providing complete privacy for location sharing services over mOSNs. Theoretical analysis and extensive experimental results demonstrate the feasibility and efficiency of the proposed system and protocol. key words: privacy-preserving protocol, location sharing, mOSNs, system architecture

[1]  Gang Sun,et al.  L2P2: A location-label based approach for privacy preserving in LBS , 2017, Future Gener. Comput. Syst..

[2]  Xiaohui Liang,et al.  Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.

[3]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[4]  Sheikh Iqbal Ahamed,et al.  Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based Applications , 2010, 2010 IEEE Second International Conference on Social Computing.

[5]  David Wolinsky,et al.  Crypto-Book: an architecture for privacy preserving online identities , 2013, HotNets.

[6]  Ming Li,et al.  Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks , 2013, IEEE Transactions on Wireless Communications.

[7]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[8]  Donghyun Kim,et al.  A New Mobile Online Social Network Based Location Sharing with Enhanced Privacy Protection , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[9]  Waseem A. Karim The Privacy Implications of Personal Locators: Why You Should Think Twice Before Voluntarily Availing Yourself to GPS Monitoring , 2004 .

[10]  Fan Li,et al.  Providing Location-Aware Location Privacy Protection for Mobile Location-Based Services , 2016 .

[11]  Kim-Kwang Raymond Choo,et al.  Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data , 2018, Future Gener. Comput. Syst..

[12]  Jin Li,et al.  MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks , 2014, J. Internet Serv. Inf. Secur..

[13]  Kang G. Shin,et al.  LISA: Location information ScrAmbler for privacy protection on smartphones , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[14]  Landon P. Cox,et al.  SmokeScreen: flexible privacy controls for presence-sharing , 2007, MobiSys '07.

[15]  Sébastien Canard,et al.  Highly privacy-protecting data sharing in a tree structure , 2016, Future Gener. Comput. Syst..

[16]  Kang G. Shin,et al.  Privacy protection for users of location-based services , 2012, IEEE Wireless Communications.

[17]  Kang G. Shin,et al.  Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps , 2015 .

[18]  Jin Li,et al.  Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks , 2017, IEEE Systems Journal.

[19]  Mahesh Balakrishnan,et al.  Contrail: Decentralized and Privacy-Preserving Social Networks on Smartphones , 2014, IEEE Internet Computing.

[20]  Jin Li,et al.  A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE , 2006, EUC Workshops.

[21]  Muttukrishnan Rajarajan,et al.  Privacy Preserving Text Analytics: Research Challenges and Strategies in Name Analysis , 2015 .

[22]  Eiji Okamoto,et al.  Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks , 2006 .

[23]  Jin Li,et al.  Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature , 2007, ProvSec.

[24]  Udai Pratap Rao,et al.  A Novel Framework for Privacy Preserving in Location Based Services , 2015, 2015 Fifth International Conference on Advanced Computing & Communication Technologies.

[25]  Jin Li,et al.  N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks , 2016, Int. J. Comput. Math..

[26]  Jun Yang,et al.  An efficient and privacy-preserving location sharing mechanism , 2016, Comput. Stand. Interfaces.

[27]  Jin Li,et al.  Universal Designated Verifier Ring Signature (Proof) Without Random Oracles , 2006, EUC Workshops.

[28]  Peter Schartner,et al.  Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[29]  Yurong Xu,et al.  Providing Anonymity in Wireless Sensor Networks , 2007, IEEE International Conference on Pervasive Services.

[30]  Fengyuan Xu,et al.  MobiShare: Flexible privacy-preserving location sharing in mobile online social networks , 2012, 2012 Proceedings IEEE INFOCOM.

[31]  David Wolinsky,et al.  Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities , 2016, CODASPY.

[32]  Frank Stajano,et al.  Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[33]  Li Xiong,et al.  Protecting Locations with Differential Privacy under Temporal Correlations , 2014, CCS.