Abstract
There are two popular location-based service (LBS) applications: searching k-nearest neighbor Points of Interests (kNN POIs) and finding Nearby Friends (NF) via a social network server (SNS). Nevertheless, both applications are based on users’ current locations, and no scheme has been devised yet to merge POIs, NF and SNS together. A series of works were proposed to preserve users’ query privacy leaked from service attributes of POIs or location privacy over Mobile Social Networks (MSNs). However, their communication and computation costs are heavy.
In this paper, we design a novel LBS application named NFPOI, which allows users to search NF based on a given POI via an SNS. To preserve users’ identity privacy, location privacy and query privacy, we firstly propose Location Privacy Preserving schemes based on Ring Signature (LPPRS). In our LPPRS, (1) Both user’s real identity and real location are kept secret from others effectively. (2) Due to the anonymity of ring signature, the SNS was allowed to return query results while it cannot distinguish the real sender when processing a query message. Thus, the sender’s query privacy is preserved even though the SNS knows the actual attributes and locations of POIs. (3) Neither a fully trusted third party (TTP) nor a pre-shared secret key with friends is required. A semi-TTP scheme and a TTP-free scheme were proposed respectively with different trade-offs in efficiency and security level. (4) Communication and computation costs for user side are less than existing works.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Alice represents a user or a user’s device in this work.
- 2.
The details of RingCT 3.0 are in the full version.
- 3.
AES represents a symmetric encryption algorithm in this work.
- 4.
RSA represents an asymmetric encryption algorithm in this work. Note that RSA can be replaced by Elliptic Curve Cryptography or other asymmetric encryption algorithms in trade-offs in efficiency and security.
- 5.
- 6.
comp.cost is short for computation cost.
- 7.
comm.cost is short for communication cost.
- 8.
References
Pingley, A., Zhang, N., Fu, X., Choi, H.-A., Subramaniam, S., Zhao, W.: Protection of query privacy for continuous location based services. In: 2011 Proceedings IEEE INFOCOM, pp. 1710–1718. IEEE (2011)
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31–42 (2003)
Yang, D., Fang, X., Xue, G.: Truthful incentive mechanisms for k-anonymity location privacy. In: 2013 Proceedings IEEE INFOCOM, pp. 2994–3002. IEEE (2013)
Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 754–762. IEEE (2014)
Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS 2005. Proceedings. International Conference on Pervasive Services, 2005, pp. 88–97. IEEE (2005)
Lu, H., Jensen, C.S., Yiu, M.L.: PAD: privacy-area aware, dummy-based location privacy in mobile services. In: Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, pp. 16–23 (2008)
Liu, H., Li, X., Li, H., Ma, J., Ma, X.: Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1–9. IEEE (2017)
Sun, G., Song, L., Liao, D., Hongfang, Yu., Chang, V.: Towards privacy preservation for “check-in” services in location-based social networks. Inf. Sci. 481, 616–634 (2019)
Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services, pp. 177–189 (2004)
Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) Pervasive 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005). https://doi.org/10.1007/11428572_10
Beresford, A.R., Stajano, F.: Mix zones: user privacy in location-aware services. In: IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second, pp. 127–131. IEEE (2004)
Freudiger, J., Shokri, R., Hubaux, J.-P.: On the optimal placement of mix zones. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 216–234. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03168-7_13
Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-73540-3_14
Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: 2011 IEEE 27th International Conference on Data Engineering, pp. 601–612. IEEE (2011)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16
Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505–524. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_29
Li, X.-Y., Jung, T.: Search me if you can: privacy-preserving location query service. In: 2013 Proceedings IEEE INFOCOM, pp. 2760–2768. IEEE (2013)
Novak, E., Li, Q.: Near-pri: private, proximity based location sharing. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 37–45. IEEE (2014)
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.-L.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 121–132 (2008)
Khoshgozaran, A., Shirani-Mehr, H., Shahabi, C.: SPIRAL: a scalable private information retrieval approach to location privacy. In: 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW, pp. 55–62. IEEE (2008)
Papadopoulos, S., Bakiras, S., Papadias, D.: Nearest neighbor search with strong location privacy. Proc. VLDB Endow. 3(1–2), 619–629 (2010)
Paulet, R., Kaosar, M.G., Yi, X., Bertino, E.: Privacy-preserving and content-protecting location based queries. IEEE Trans. Knowl. Data Eng. 26(5), 1200–1210 (2013)
Gupta, R., Rao, U.P.: An exploration to location based service and its privacy preserving techniques: a survey. Wirel. Pers. Commun. 96(2), 1973–2007 (2017)
Liu, B., Zhou, W., Zhu, T., Gao, L., Xiang, Y.: Location privacy and its applications: a systematic study. IEEE Access 6, 17606–17624 (2018)
Almusaylim, Z.A., Jhanjhi, N.Z.: Comprehensive review: privacy protection of user in location-aware services of mobile cloud computing. Wirel. Pers. Commun. 111(1), 541–564 (2020)
Liao, D., Li, H., Sun, G., Anand, V.: Protecting user trajectory in location-based services. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2015)
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173–187. IEEE (2009)
Yuen, T.H., et al.: RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security. Technical report, Cryptology ePrint Archive, Report 2019/508. To appear in FC 2020 (2019)
Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552–565. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_32
Wei, W., Xu, F., Li, Q.: Mobishare: flexible privacy-preserving location sharing in mobile online social networks. In: 2012 Proceedings IEEE INFOCOM, pp. 2616–2620. IEEE (2012)
Peng, T., Liu, Q., Wang, G., Xiang, Y., Chen, S.: Multidimensional privacy preservation in location-based services. Futur. Gener. Comput. Syst. 93, 312–326 (2019)
Liu, Z., Li, J., Chen, X., Li, J., Jia, C.: New privacy-preserving location sharing system for mobile online social networks. In: 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 214–218. IEEE (2013)
Liu, Y., Han, J., Wang, J.: Rumor riding: anonymizing unstructured peer-to-peer systems. IEEE Trans. Parallel Distrib. Syst. 22(3), 464–475 (2010)
Li, J., Yan, H., Liu, Z., Chen, X., Huang, X., Wong, D.S.: Location-sharing systems with enhanced privacy in mobile online social networks. IEEE Syst. J. 11(2), 439–448 (2015)
Schlegel, R., Chow, C.-Y., Huang, Q., Wong, D.S.: Privacy-preserving location sharing services for social networks. IEEE Trans. Serv. Comput. 10(5), 811–825 (2016)
Zeng, S., Yi, M., He, M., Chen, Y.: New approach for privacy-aware location-based service communications. Wireless Pers. Commun. 101(2), 1057–1073 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Cai, C., Yuen, T.H., Cui, H., Wu, M., Yiu, SM. (2021). LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks. In: Wu, Y., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2020. Lecture Notes in Computer Science(), vol 12612. Springer, Cham. https://doi.org/10.1007/978-3-030-71852-7_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-71852-7_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-71851-0
Online ISBN: 978-3-030-71852-7
eBook Packages: Computer ScienceComputer Science (R0)