Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2093973.2094024acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
poster

Private geosocial networking

Published: 01 November 2011 Publication History

Abstract

Location based social or geosocial networks (GSNs) have recently emerged as a natural combination of location based services with online social networks: users register their location and activities, share it with friends and achieve special status (e.g., "mayorship" badges) based on aggregate location predicates. Boasting millions of users and tens of daily check-ins, such services pose significant privacy threats: user location information may be tracked and leaked to third parties. Conversely, a solution enabling location privacy may provide cheating capabilities to users wanting to claim special location status. In this paper we introduce new mechanisms that allow users to (inter)act privately in today's geosocial networks while simultaneously ensuring honest behaviors. We show that our solutions are efficient both on the provider and the client side.

References

[1]
Foursquare, https://foursquare.com/.
[2]
SCVNGR. http://www.scvngr.com/.
[3]
Gowalla. http://gowalla.com/.
[4]
Groundmap. http://www.groundmap.com/.
[5]
Balachander Krishnamurthy and Craig E. Wills. On the leakage of personally identifiable information via online social networks. In WOSN, pages 7--12, 2009.
[6]
Balachander Krishnamurthy and Craig E. Wills. On the leakage of personally identifiable information via online social networks. Computer Communication Review, 40(1):112--117, 2010.
[7]
Josh Lowensohn. Apple sued over location tracking in iOS. Cnet News, http://news.cnet.com/8301-27076_3-20057245-248.html/, 2011.
[8]
Gpscheat! http://www.gpscheat.com/.
[9]
John R. Douceur. The Sybil Attack. In IPTPS, pages 251--260, 2002.
[10]
Marco Gruteser and Dirk Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of MobiSys, 2003.
[11]
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban. Dan Work, Juan-Carlos Herrera, Re Bayen, Murali Annavaram, and Quinn Jacobson. Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring. In Proceedings of ACM MobiSys, 2008.
[12]
Femi G. Olumofin, Piotr K. Tysowski, Ian Goldberg, and Urs Hengartner. Achieving Efficient Query Privacy for Location Based Services. In Privacy Enhancing Technologies, pages 93--110, 2010.
[13]
Xiao Pan, Xiaofeng Meng, and Jianliang Xu. Distortion-based anonymity for continuous queries in location-based mobile services. In GIS, pages 256--265, 2009.
[14]
Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino. Preventing velocity-based linkage attacks in location-aware applications. In GIS, pages 246--255, 2009.
[15]
Stefan Saroiu and Alec Wolman. Enabling New Mobile Applications with Location Proofs. In Proceedings of HotMobile, 2009.
[16]
W. Luo and U. Hengartner. VeriPlace: A Privacy-Aware Location Proof Architecture. In Proceedings of ACM SIGSPATIAL GIS, 2010.
[17]
Z. Zhu and G. Cao. APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services. In Proceedings of IEEE INFOCOM, 2011.
[18]
Ge Zhong, Ian Goldberg, and Urs Hengartner. Louis, Lester and Pierre: Three Protocols for Location Privacy. In Proceedings of PETS, 2007.
[19]
Justin Manweiler, Ryan Scudellari, Zachary Cancio, and Landon P. Cox. We saw each other on the subway: secure, anonymous proximity-based missed connections. In Proceedings of HotMobile, 2009.
[20]
A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh. Location privacy via private proximity testing. In Proceedings of NDSS, 2011.
[21]
Dan Boneh and Matt Franklin. Anonymous Authentication With Subset Queries (Extended Abstract). In in Proceedings of CCS, 1999.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
GIS '11: Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
November 2011
559 pages
ISBN:9781450310314
DOI:10.1145/2093973

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 2011

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Poster

Conference

GIS '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 220 of 1,116 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2017)Location-Based Distance Measures for Geosocial SimilarityACM Transactions on the Web10.1145/305495111:3(1-32)Online publication date: 3-Jul-2017
  • (2016)Uncertainty in geosocial dataSIGSPATIAL Special10.1145/3024087.30240888:2(3-10)Online publication date: 9-Dec-2016
  • (2013)CREPUSCOLO: A collusion resistant privacy preserving location verification system2013 International Conference on Risks and Security of Internet and Systems (CRiSIS)10.1109/CRiSIS.2013.6766357(1-9)Online publication date: Oct-2013
  • (2012)The shy mayorProceedings of the 10th international conference on Applied Cryptography and Network Security10.1007/978-3-642-31284-7_26(436-454)Online publication date: 26-Jun-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media