Preserving location privacy for a group of users

被引:4
作者
Ashouri-Talouki, Maede [1 ]
Baraani-Dastjerdi, Ahmad [1 ]
Selcuk, Ali Aydin [2 ]
机构
[1] Univ Isfahan, Fac Engn, Dept Comp Engn, Esfahan, Iran
[2] TOBB Univ Econ & Technol, Dept Comp Engn, Ankara, Turkey
关键词
Location privacy; secure multiparty computation; location-based service; AV-net; K-ANONYMITY; PROTOCOL;
D O I
10.3906/elk-1109-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Location privacy is an interesting problem that has been receiving considerable attention. This problem has been widely discussed from the individual point of view; however, there exist only a few works that support location privacy for a group of users. In this paper we consider the problem of supporting location privacy for a group of users during the use of location-based services (LBSs). We assume a group of users who want to benefit from a LBS and find the nearest meeting place that minimizes their aggregate distance. Each user in this scenario wants to protect his or her location from the LBS, outside attackers, and other group members. We show that individual solutions for location privacy cannot be directly applied to the group location privacy problem and a special solution must be developed. We identify the privacy issues for this group scenario and propose a resource-aware solution in order to satisfy these group privacy issues. Our solution is based on secure multiparty computation and the anonymous veto network protocol. The proposed protocol decreases the number of group queries to a large extent, as it only sends a single query to the LBS. Consequently, the LBS overhead to evaluate the query and the size of the LBS result are significantly decreased. The proposed protocol also protects the LBS from the excessive disclosure of points of interest and the LBS provider only needs to apply an existing private nearest neighbor (NN) query algorithm instead of an aggregate NN query algorithm. The performance and security analysis show that the protocol is secure against a partial collusion attack and a denial-of-service attack in a malicious model.
引用
收藏
页码:1857 / 1870
页数:14
相关论文
共 38 条
[1]  
[Anonymous], 2010, P 13 INT C EXT DAT T
[2]  
[Anonymous], 2008, LOCATION PRIVACY LOC
[3]   An Obfuscation-Based Approach for Protecting Location Privacy [J].
Ardagna, Claudio A. ;
Cremonini, Marco ;
di Vimercati, Sabrina De Capitani ;
Samarati, Pierangela .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) :13-27
[4]  
Bamba B., 2008, Proceeding of 17th International Conference on World Wide Web, P237, DOI DOI 10.1145/1367497.1367531
[5]  
Bhaskar P, 2007, ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, P147
[6]  
Chow Chi- Yin., 2006, ACM-GIS, P171
[7]   On Group Nearest Group Query Processing [J].
Deng, Ke ;
Sadiq, Shazia ;
Zhou, Xiaofang ;
Xu, Hu ;
Fung, Gabriel Pui Cheong ;
Lu, Yansheng .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (02) :295-308
[8]  
Dewri R., 2011, 7 INT ICST C SEC PRI, P1
[9]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[10]  
Ghinita G., 2007, Proceedings of 16th International Conference on World Wide Web, P371, DOI DOI 10.1145/1242572.1242623