Skip to main content

Privacy Preserving for Location-Based IoT Services

  • Conference paper
  • First Online:
Smart Grid and Internet of Things (SGIoT 2018)

Abstract

In recent years, the applications of location-based Internet of Things (IoT) services change the way of people’s lives and works. However, these applications may disclose some private location information of users due to lack of privacy protection mechanism, which could result in serious security issues. To protect users’ confidential data, an efficient and secure private proximity testing (ESPT) scheme is designed for location-based IoT services to improve the efficiency while maintaining the privacy of the location of the users. The proposed scheme enables a user to query a service provider whether some people are within a given search range without disclosing any private location information of the user. The security analysis and the simulation results demonstrate that the proposed scheme could not only implement a privacy-preserving proximity test, but also has less computational overheads.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 60.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Prigg, M.: Privacy warning over app that can track your location even if you turn GPS off on your phone. http://www.dailymail.co.uk/sciencetech/article-5134219/App-track-location-turn-GPSoff.html. Accessed 10 Dec 2017

  2. Chong, Z.: Obike becomes latest victim of global data breach. https://www.cnet.com/news/yellow-bike-sharing-firm-is-new-victim-of-global-data-breach/. Accessed 12 Dec 2017

  3. Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Proceedings of NDSS 2011 (2011)

    Google Scholar 

  4. Saldamli, G., Chow, R., Jin, H., Knijnenburg, B.P.: Private proximity testing with an untrusted server. In: Proceedings of 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2013, WISEC 2013, pp. 113–118. ACM (2013)

    Google Scholar 

  5. Zhuo, G., Jia, Q., Guo, L., Li, M., Fang, Y.: Privacy-preserving verifiable proximity test for location-based services. In: Proceedings of IEEE Global Communications Conference 2015 (GLOBECOM 2015), pp. 1–6. IEEE, USA (2015)

    Google Scholar 

  6. Novak, E., Li, Q.: Near-PRI: private, proximity based location sharing. In: Proceedings of IEEE INFOCOM 2014, pp. 37–45. IEEE, Canada (2014)

    Google Scholar 

  7. Huang, C., Lu, R., Zhu, H., Shao, J., Alamer, A., Lin, X.: EPPD: efficient and privacy-preserving proximity testing with differential privacy techniques. In: Proceedings of IEEE International Conference on Communications 2016 (ICC 2016), pp. 1–6. EEE, Malaysia (2016)

    Google Scholar 

  8. Zheng, Y., Li, M., Lou, W., Hou, Y.T.: SHARP: private proximity test and secure handshake with cheat-proof location tags. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 361–378. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33167-1_21

    Chapter  Google Scholar 

  9. Zheng, Y., Li, M., Lou, W., Hou, Y.T.: Location based handshake and private proximity test with location tags. IEEE Trans. Dependable Secure Comput. 14(4), 406–419 (2017)

    Article  Google Scholar 

  10. Sedenka, J., Gasti, P.: Privacy-preserving distance computation and proximity testing on earth, done right. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security 2014 (ASIA CCS 2014), pp. 99–110 (2014)

    Google Scholar 

  11. Andr´es, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS 2013), pp. 901–914 (2013)

    Google Scholar 

  12. Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704–719 (2016)

    Google Scholar 

  13. Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4), 46–50 (2014)

    Article  Google Scholar 

  14. The AVISPA Team: AVISPA v1.1 User Manual. http://www.avispa-project.org/package/user-manual.pdf. Accessed 21 Aug 2017

  15. Viganò, L.: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theoret. Comput. Sci. 155, 61–86 (2006)

    Article  Google Scholar 

  16. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgment

We appreciate the financial support from Ministry of Education, Singapore through the Academic Research Fund (AcRF) Tier 1 for the project of RG20/15.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yue Qiu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qiu, Y., Ma, M. (2019). Privacy Preserving for Location-Based IoT Services. In: Pathan, AS., Fadlullah, Z., Guerroumi, M. (eds) Smart Grid and Internet of Things. SGIoT 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 256. Springer, Cham. https://doi.org/10.1007/978-3-030-05928-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05928-6_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05927-9

  • Online ISBN: 978-3-030-05928-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics