Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1376616.1376631acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Private queries in location based services: anonymizers are not necessary

Published: 09 June 2008 Publication History

Abstract

Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must not be disclosed. Existing solutions utilize a trusted anonymizer between the users and the LBS. This approach has several drawbacks: (i) All users must trust the third party anonymizer, which is a single point of attack. (ii) A large number of cooperating, trustworthy users is needed. (iii) Privacy is guaranteed only for a single snapshot of user locations; users are not protected against correlation attacks (e.g., history of user movement).
We propose a novel framework to support private location-dependent queries, based on the theoretical work on Private Information Retrieval (PIR). Our framework does not require a trusted third party, since privacy is achieved via cryptographic techniques. Compared to existing work, our approach achieves stronger privacy for snapshots of user locations; moreover, it is the first to provide provable privacy guarantees against correlation attacks. We use our framework to implement approximate and exact algorithms for nearest-neighbor search. We optimize query execution by employing data mining techniques, which identify redundant computations. Contrary to common belief, the experimental results suggest that PIR approaches incur reasonable overhead and are applicable in practice.

References

[1]
G. Aggarwal, N. Mishra, and B. Pinkas. Secure Computation of the k th-Ranked Element. In Proc. of Int. Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pages 40--55, 2004.]]
[2]
R. Agrawal, T. Imielinski, and A. N. Swami. Mining Association Rules between Sets of Items in Large Databases. In Proc. of ACM SIGMOD, pages 207--216, 1993.]]
[3]
R. Cheng, Y. Zhang, E. Bertino, and S. Prabhakar. Preserving user location privacy in mobile data management infrastructures. In Int. Workshop on Privacy Enhancing Technologies, pages 393--412, 2006.]]
[4]
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In IEEE Symposium on Foundations of Computer Science, pages 41--50, 1995.]]
[5]
C.-Y. Chow and M. F. Mokbel. Enabling Private Continuous Queries for Revealed User Locations. In Proc. of SSTD, pages 258--275, 2007.]]
[6]
C.-Y. Chow, M. F. Mokbel, and X. Liu. A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services. In ACM International Symposium on Advances in Geographic Information Systems, 2006.]]
[7]
M. de Berg, M. van Kreveld, M. Overmars, and O. Schwarzkopf. Computational Geometry: Algorithms and Applications. Springer-Verlag, 2nd edition, 2000.]]
[8]
R. Fagin. Combining Fuzzy Information from Multiple Systems. In Proc. of ACM PODS, pages 216--226, 1996.]]
[9]
J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss, and R. N. Wright. Secure Multiparty Computation of Approximations. In Int. Colloquium on Automata, Languages and Programming (ICALP), 2001.]]
[10]
D. E. Flath. Introduction to Number Theory. John Wiley & Sons, 1988.]]
[11]
B. Gedik and L. Liu. Location Privacy in Mobile Systems: A Personalized Anonymization Model. In Proc. of ICDCS, pages 620--629, 2005.]]
[12]
G. Ghinita, P. Kalnis, and S. Skiadopoulos. PRIVE: Anonymous Location-based Queries in Distributed Mobile Systems. In Proc. of Int. Conference on World Wide Web (WWW), pages 371--380, 2007.]]
[13]
O. Goldreich. The Foundations of Cryptography, volume 2. Cambridge University Press, 2004.]]
[14]
M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In Proc. of USENIX MobiSys, 2003.]]
[15]
H. Hu and D. L. Lee. Range Nearest-Neighbor Query. IEEE TKDE, 18(1):78--91, 2006.]]
[16]
P. Indyk and D. P. Woodruff. Polylogarithmic Private Approximations and Efficient Matching. In Proc. of Theory of Cryptography Conference (TCC), pages 245--264, 2006.]]
[17]
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE TKDE, 19(12):1719--1733, 2007.]]
[18]
A. Khoshgozaran and C. Shahabi. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In Proc. of SSTD, pages 239--257, 2007.]]
[19]
E. Kushilevitz and R. Ostrovsky. Replication is NOT needed: Single database, computationally-private information retrieval. In IEEE Symposium on Foundations of Computer Science, pages 364--373, 1997.]]
[20]
M. F. Mokbel, C. Y. Chow, andW. G. Aref. The New Casper: Query Processing for Location Services without Compromising Privacy. In Proc. of VLDB, 2006.]]
[21]
B. Moon, H. V. Jagadish, C. Faloutsos, and J. H. Saltz. Analysis of the Clustering Properties of the Hilbert Space-Filling Curve. IEEE TKDE, 13(1):124--141, 2001.]]
[22]
P. Samarati. Protecting Respondents? Identities in Microdata Release. IEEE TKDE, 13(6):1010--1027, 2001.]]
[23]
M. Shaneck, Y. Kim, and V. Kum. Privacy Preserving Nearest Neighbor Search. In Int. Workshop on Privacy Aspects of Data Mining (PADM), 2006.]]
[24]
R. Sion and B. Carbunar. On the Computational Practicality of Private Information Retrieval. In Proc. of Network and Distributed System Security Symposium (NDSS), 2007.]]
[25]
J. Vaidya and C. Clifton. Privacy-Preserving Top-K Queries. In Proc. of ICDE, pages 545--546, 2005.]]

Cited By

View all
  • (2024)Collaborative Caching for Implementing a Location-Privacy Aware LBS on a MANETApplied Sciences10.3390/app14221048014:22(10480)Online publication date: 14-Nov-2024
  • (2024)Efficient Multi-Source Anonymity for Aggregated Internet of Vehicles DatasetsApplied Sciences10.3390/app1408323014:8(3230)Online publication date: 11-Apr-2024
  • (2024)In Silico Human Mobility Data Science: Leveraging Massive Simulated Mobility Data (Vision Paper)ACM Transactions on Spatial Algorithms and Systems10.1145/367255710:2(1-27)Online publication date: 3-Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '08: Proceedings of the 2008 ACM SIGMOD international conference on Management of data
June 2008
1396 pages
ISBN:9781605581026
DOI:10.1145/1376616
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 June 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. location anonymity
  2. private information retrieval
  3. query privacy

Qualifiers

  • Research-article

Conference

SIGMOD/PODS '08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)60
  • Downloads (Last 6 weeks)6
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Collaborative Caching for Implementing a Location-Privacy Aware LBS on a MANETApplied Sciences10.3390/app14221048014:22(10480)Online publication date: 14-Nov-2024
  • (2024)Efficient Multi-Source Anonymity for Aggregated Internet of Vehicles DatasetsApplied Sciences10.3390/app1408323014:8(3230)Online publication date: 11-Apr-2024
  • (2024)In Silico Human Mobility Data Science: Leveraging Massive Simulated Mobility Data (Vision Paper)ACM Transactions on Spatial Algorithms and Systems10.1145/367255710:2(1-27)Online publication date: 3-Jul-2024
  • (2024)Mobility Data Science: Perspectives and ChallengesACM Transactions on Spatial Algorithms and Systems10.1145/365215810:2(1-35)Online publication date: 1-Jul-2024
  • (2024)Achieving Privacy-Preserving Trajectory Query in Geospatial Information Systems With Outsourced CloudIEEE Transactions on Services Computing10.1109/TSC.2024.337715917:4(1354-1368)Online publication date: Jul-2024
  • (2024)Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on CloudIEEE Transactions on Services Computing10.1109/TSC.2023.331158617:3(1239-1251)Online publication date: May-2024
  • (2024)BlockSC: A Blockchain Empowered Spatial Crowdsourcing Service in Metaverse While Preserving User Location PrivacyIEEE Journal on Selected Areas in Communications10.1109/JSAC.2023.334541642:4(880-892)Online publication date: Apr-2024
  • (2024)An Innovative Approach Using Cyber Security for Steganography for Wireless Adhoc Mobile Network Application2024 International Conference on Science Technology Engineering and Management (ICSTEM)10.1109/ICSTEM61137.2024.10561170(1-5)Online publication date: 26-Apr-2024
  • (2024)Location Privacy Preservation for Location Based Service Applications: Taxonomies, Issues and Future Research DirectionsWireless Personal Communications10.1007/s11277-024-10977-9134:3(1617-1639)Online publication date: 6-Apr-2024
  • (2023)Differentiated Location Privacy Protection in Mobile Communication Services: A Survey from the Semantic Perception PerspectiveACM Computing Surveys10.1145/361758956:3(1-36)Online publication date: 5-Oct-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media