Abstract
More and more applications based on location services continue to make our lives rich and convenient. However, location information may also quietly expose our privacy, such as work location, eating habits, etc. In this article, we have designed a solution to the problem of invisibly leaking our takeaway order information. In our scheme, users only need to submit a service request. The edge server is responsible for the service response and completes most calculations. The service platform generates orders based on the calculation results, sends them to the merchants and returns them, and selects suitable delivery men for the users. The proposed scheme uses non-interactive key exchange and secure Manhattan distance calculation to protect the location privacy of mobile users. Security analysis shows the proposed scheme is privacy-protected under our defined threat model. In addition, our program experiment proved to be feasible.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shen, H., Li, J., Wu, G., Zhang, M.: Data release for machine learning via correlated differential privacy. Inf. Process. Manag. 60(3), 103349 (2023)
Shen, H., Zhang, M., Shen, J.: Efficient privacy-preserving cube-data aggregation aggregation scheme for smart grids. IEEE Trans. Inf. Forensics Secur. 12(6), 1369–1381 (2017)
Shen, H., Zhang, M., Wang, H., Guo, F., Susilo, W.: A lightweight privacy-preserving fair meeting location determination scheme. IEEE Internet Things J. 7(4), 3038–3093 (2020)
Alrayes, F., Abdelmoty, A.I., El-Geresy, W.B., Theodorakopoulos, G.: Modelling perceived risks to personal privacy from location disclosure on online social networks. Int. J. Geogr. Inf. Sci. 34(1), 150–176 (2020)
Dou, J., Ge, X., Wang, Y.: Secure Manhattan distance computation and its application. Chin. J. Comput. 43(2), 352–365 (2020)
Zhu, H., Wang, F., Lu, R., Liu, F., Fu, G., Li, H.: Efficient and privacy-preserving proximity detection schemes for social applications. IEEE Internet Things J. 5(4), 2947–2957 (2018)
Sun, A., Zhao, G., Zhao, M., et al.: A sign(x) point in-out polygon test algorithm based on sign function and its application. Comput. Eng. Sci. 39(4), 785–790 (2017)
Ma, C., Zhang, Y.: An improved method for judging relationship between point and polygon based on cross product. Sci. Surv. Mapp. 38(1), 125–127 (2013)
Shen, C.: Q algorithm of point-in-polygon analysis. J. Yangzhou Univ. Nat. Sci. Ed. 4, 24–26 (1999)
Zhai, Y., Xu, W., Zhang, Q.: Judgment of topological relation between point and polygon or polyhedron. Comput. Eng. Des. 4, 972–976 (2015)
Liu, L.: An optimized algorithm to detemine topo-relation between point and polygon and clockwise or anti-clockwise in polygon. Geomat. Spatial Inf. Technol. 30(1), 84–86 (2007)
Dong, X., Liu, R.: New algorithm for determining position relation between simple polygon and point. Comput. Eng. Appl. 45(2), 185–186 (2009)
Zhang, L., He, F., Li, H.: A method for detecting points in polygons based on singular ray method, vol. 37. no. S2, pp. 133–135 (2020)
Shen, H., Zhang, M., Wang, H., Guo, F., Susilo, W.: A lightweight privacy-preserving fair meeting location determination scheme. IEEE Internet Things J. 7(4), 3083–3093 (2020)
Sun, G., Song, L., Liao, D., Yu, H., Chang, V.: Towards privacy preservation for ‘check-in’ services in location-based social networks. Inf. Sci. 481, 616–634 (2019)
Wang, N., Fu, J., Li, J., Bhargava, B.K.: Source-location privacy protection based on anonymity cloud in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 15, 100–114 (2020)
Huang, K.L., Kanhere, S.S., Hu, W.: Preserving privacy in participatory sensing systems. Comput. Commun. 33(11), 1266–1280 (2010)
Tian, S., Cai, Y., Zheng, Q.: A hybrid approach for privacy-preserving processing of knn queries in mobile database systems. In: 22nd ACM International Conference on Information and Knowledge Management, CIKM 2013, San Francisco, CA, USA, 27 October–1 November 2013, pp. 1161–1164 (2013)
Zhu, X., Chi, H., Niu, B., Zhang, W., Li, Z., Li, H.: MobiCache: when k-anonymity meets cache. In: 2013 IEEE Global Communications Conference, GLOBECOM 2013, Atlanta, GA, USA, 9–13 December 2013, pp. 820–825 (2013)
Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4–8 November 2013, pp. 901–914 (2013)
Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546–1559 (2016)
Shen, H., Wu, G., Xia, Z., Susilo, W., Zhang, M.: A privacy-preserving and Verifiable statistical analysis scheme for an E-Commerce platform. IEEE Trans. Inf. Forensics Secur. 18, 2637–2652 (2023)
Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve. IACR Cryptol. ePrint Arch., p. 54 (2003)
Shen, X., Wang, L., Pei, Q., Liu, Y., Li, M.: Location privacy-preserving in online taxi-hailing services. Peer-to-Peer Netw. Appl. 14(1), 69–81 (2021)
Bilogrevic, I., Jadliwala, M., Joneja, V., Kalkan, K., Hubaux, J.-P., Aad, I.: Privacy-preserving optimal meeting location determination on mobile devices. IEEE Trans. Inf. Forensics Secur. 9(7), 1141–1156 (2014)
Kalkan, S., Kaya, K., Selcuk, A.A.: Generalized ID-based ElGamal signatures. In: 22nd International Symposium on Computer and Information Sciences, Ankara, Turkey, 7–9 November 2007, pp. 1–6 (2007)
Acknowledgements
This work is supported in part by the National Natural Science Foundation of China (61702168) and in part by the Green Industry Technology Leading Program of Hubei University of Technology (XJ2021000901).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Xu, L., Li, J., Zhang, H., Shen, H. (2023). A Privacy-Preserving Takeaway Delivery Service Scheme. In: Zhang, M., Au, M.H., Zhang, Y. (eds) Provable and Practical Security. ProvSec 2023. Lecture Notes in Computer Science, vol 14217. Springer, Cham. https://doi.org/10.1007/978-3-031-45513-1_21
Download citation
DOI: https://doi.org/10.1007/978-3-031-45513-1_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45512-4
Online ISBN: 978-3-031-45513-1
eBook Packages: Computer ScienceComputer Science (R0)