Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies

被引:109
作者
Mascetti, Sergio [2 ]
Freni, Dario [2 ]
Bettini, Claudio [2 ]
Wang, X. Sean [1 ]
Jajodia, Sushil [3 ]
机构
[1] Univ Vermont, Dept Comp Sci, Burlington, VT 05405 USA
[2] Univ Milan, DICo, Milan, Italy
[3] George Mason Univ, CSIS, Fairfax Cty, VA 22030 USA
基金
美国国家科学基金会;
关键词
Proximity services; Geo-social networks; Location-based services; Location privacy; LOCATION PRIVACY;
D O I
10.1007/s00778-010-0213-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A major feature of the emerging geo-social networks is the ability to notify a user when any of his friends (also called buddies) happens to be geographically in proximity. This proximity service is usually offered by the network itself or by a third party service provider (SP) using location data acquired from the users. This paper provides a rigorous theoretical and experimental analysis of the existing solutions for the location privacy problem in proximity services. This is a serious problem for users who do not trust the SP to handle their location data and would only like to release their location information in a generalized form to participating buddies. The paper presents two new protocols providing complete privacy with respect to the SP and controllable privacy with respect to the buddies. The analytical and experimental analysis of the protocols takes into account privacy, service precision, and computation and communication costs, showing the superiority of the new protocols compared to those appeared in the literature to date. The proposed protocols have also been tested in a full system implementation of the proximity service.
引用
收藏
页码:541 / 566
页数:26
相关论文
共 30 条
  • [1] Buddy tracking - efficient proximity detection among mobile friends
    Amir, Arnon
    Efrat, Alon
    Myllymaki, Jussi
    Palaniappan, Lingeshwaran
    Wampler, Kevin
    [J]. PERVASIVE AND MOBILE COMPUTING, 2007, 3 (05) : 489 - 511
  • [2] Bettini C, 2009, LECT NOTES COMPUTER, V5599
  • [3] Bettini Claudio., 2000, TIME GRANULARITIES D
  • [4] BISHOP M, 2003, COMPUTER SECURITY AR, pCH32
  • [5] Range and kNN query processing for moving objects in grid model
    Chon, HD
    Agrawal, D
    El Abbadi, A
    [J]. MOBILE NETWORKS & APPLICATIONS, 2003, 8 (04) : 401 - 412
  • [6] Freni D, 2009, LECT NOTES COMPUT SC, V5644, P441, DOI 10.1007/978-3-642-02982-0_36
  • [7] Protecting location privacy with personalized k-anonymity:: Architecture and algorithms
    Gedik, Bugra
    Liu, Ling
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) : 1 - 18
  • [8] Ghinita G., 2009, P 17 ACM SIGSPATIAL, P246, DOI DOI 10.1145/1653771.1653807
  • [9] Ghinita G., 2008, P ACM SIGMOD INT C M, P121, DOI DOI 10.1145/1376616.1376631
  • [10] Anonymous usage of location-based services through spatial and temporal cloaking
    Gruteser, M
    Grunwald, D
    [J]. PROCEEDINGS OF MOBISYS 2003, 2003, : 31 - 42