Abstract
The location-based services (LBS) scheme has become an essential part of people’s daily life, and it is widely used in various industries and cloud server applications. In LBS, users send the query regarding their current location to the cloud server. The cloud server collects the data related to the nearest hospital, restaurant, etc., corresponding to the received users’ query and sends them. If the cloud server is malicious, it may reveal sensitive information about the user. Therefore, users may hesitate to share their queries with the cloud server. Moreover, the cloud server wants to monetize its services, and it only provides data to the user for a prescribed fee. Hence, simultaneously achieving users’ query privacy and cloud server’s data privacy is an important goal in LBS. Existing LBS schemes have restrictions that they cannot simultaneously achieve these types of privacy at low computation costs. This work proposes three LBS schemes using the oblivious transfer (OT) protocol. The first LBS scheme provides user’s query privacy (in the presence of semi-honest cloud server) and cloud server’s data privacy; the other two provide user’s query privacy (in the presence of malicious cloud server) and cloud server’s data privacy. All the proposed schemes require significantly less exponentiation and modulus operations than existing LBS schemes. Experimental results showed that the proposed schemes required less execution time on average than the existing LBS schemes.
Similar content being viewed by others
References
Ashibani, Y., Mahmoud, Q.H.: Design and evaluation of a user authentication model for IoT networks based on app event patterns. Clust. Comput. 24(2), 837–850 (2021)
Bellare, M., Micali, S.: Non-interactive oblivious transfer and applications. In: Conference on the Theory and Application of Cryptology, pp. 547–557. Springer (1989)
Bi, B., Huang, D., Mi, B., Deng, Z., Pan, H.: Efficient LBS security-preserving based on NTRU oblivious transfer. Wirel. Pers. Commun. 108(4), 2663–2674 (2019)
Boneh, D.: The decision Diffie–Hellman problem. In: International Algorithmic Number Theory Symposium, pp. 48–63. Springer (1998)
Brassard, G., Crépeau, C., Robert, J.M.: All-or-nothing disclosure of secrets. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 234–238. Springer (1986)
Brassard, G., Crepeau, C., Robert, J.M.: Information theoretic reductions among disclosure problems. In: 27th Annual Symposium on Foundations of Computer Science (SFCS 1986), pp. 168–173. IEEE (1986)
Chen, J., He, K., Yuan, Q., Chen, M., Du, R., Xiang, Y.: Blind filtering at third parties: an efficient privacy-preserving framework for location-based services. IEEE Trans. Mob. Comput. 17(11), 2524–2535 (2018)
Demmler, D., Schneider, T., Zohner, M.: ABY—a framework for efficient mixed-protocol secure two-party computation. In: NDSS (2015)
Duan, M., Li, K., Liao, X., Li, K.: A parallel multiclassification algorithm for big data using an extreme learning machine. IEEE Trans. Neural Netw. Learn. Syst. 29(6), 2337–2351 (2017)
Duan, M., Li, K., Tang, Z., Xiao, G., Li, K.: Selection and replacement algorithms for memory performance improvement in spark. Concurr. Comput. Pract. Exp. 28(8), 2473–2486 (2016)
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637–647 (1985)
Fersi, G.: Fog computing and Internet of Things in one building block: a survey and an overview of interacting technologies. Clust. Comput. 24, 1–31 (2021)
Frederiksen, T.K., Keller, M., Orsini, E., Scholl, P.: A unified approach to MPC with preprocessing using OT. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 711–735. Springer (2015)
Goldwasser, S.: How to play any mental game, or a completeness theorem for protocols with an honest majority. In: Proceedings of the Nineteenth Annual ACM STOC’87, pp. 218–229 (1987)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42 (2003)
Hazay, C., Lindell, Y.: Efficient Secure Two-Party Protocols: Techniques and Constructions. Springer, Heidelberg (2010)
Hu, Q., Duan, M., Yang, Z., Yu, S., Xiao, B.: Efficient parallel secure outsourcing of modular exponentiation to cloud for IoT applications. IEEE Internet Things J. 8(16), 12782–12791 (2020)
Huang, Y., Chapman, P., Evans, D.: Privacy-preserving applications on smartphones. In: HotSec (2011)
Jannati, H., Bahrak, B.: An oblivious transfer protocol based on Elgamal encryption for preserving location privacy. Wirel. Pers. Commun. 97(2), 3113–3123 (2017)
Li, B., Liang, R., Zhou, W., Yin, H., Gao, H., Cai, K.: LBS meets blockchain: an efficient method with security preserving trust in SAGIN. IEEE Internet Things J. (2021). https://doi.org/10.1109/JIOT.2021.3064357
Li, X., Zhu, Y., Wang, J.: Highly efficient privacy preserving location-based services with enhanced one-round blind filter. IEEE Trans. Emerg. Top. Comput. 9(4), 1803–1814 (2019)
Lindell, A.Y.: Efficient fully-simulatable oblivious transfer. In: Cryptographers’ Track at the RSA Conference, pp. 52–70. Springer (2008)
Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: Proceedings of the Twelfth Annual ACM–SIAM Symposium on Discrete Algorithms, pp. 448–457. Society for Industrial and Applied Mathematics (2001)
Paulet, R., Kaosar, M.G., Yi, X., Bertino, E.: Privacy-preserving and content-protecting location based queries. IEEE Trans. Knowl. Data Eng. 26(5), 1200–1210 (2013)
Rabin, M.: How to Exchange Secrets by Oblivious Transfer. Technical Report, TR-81. Harvard Aiken Computation Laboratory (1981)
Slimani, S., Hamrouni, T., Charrada, F.B.: Service-oriented replication strategies for improving quality-of-service in cloud computing: a survey. Clust. Comput. 24(1), 361–392 (2021)
Stern, J.P.: A new and efficient all-or-nothing disclosure of secrets protocol. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 357–371. Springer (1998)
Tzeng, W.G.: Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters. IEEE Trans. Comput. 53(2), 232–240 (2004)
uz Zaman, S.K., Jehangiri, A.I., Maqsood, T., Ahmad, Z., Umar, A.I., Shuja, J., Alanazi, E., Alasmary, W.: Mobility-aware computational offloading in mobile edge networks: a survey. Clust. Comput. 24, 1–22 (2021)
Wang, S., Wang, X.S.: In-device spatial cloaking for mobile user privacy assisted by the cloud. In: 2010 Eleventh International Conference on Mobile Data Management, pp. 381–386. IEEE (2010)
Yadav, V.K., Verma, S., Venkatesan, S.: Efficient and secure location-based services scheme in VANET. IEEE Trans. Veh. Technol. 69(11), 13567–13578 (2020)
Yadav, V.K., Verma, S., Venkatesan, S.: Linkable privacy-preserving scheme for location-based services. IEEE Trans. Intell. Transp. Syst. (2021). https://doi.org/10.1109/TITS.2021.3074974
Yao, A.C.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science (SFCS 1986), pp. 162–167. IEEE (1986)
Zheng, Y., Mei, W., Xiao, F.: Secure oblivious transfer protocol from indistinguishability obfuscation. J. China Univ. Posts Telecommun. 23(3), 1–10 (2016)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yadav, V.K., Verma, S. & Venkatesan, S. Efficient and privacy-preserving location-based services over the cloud. Cluster Comput 25, 3175–3192 (2022). https://doi.org/10.1007/s10586-021-03533-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-021-03533-8