Skip to main content

Combining Differential Privacy and PIR for Efficient Strong Location Privacy

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9239))

Abstract

Data privacy is a huge concern nowadays. In the context of location based services, a very important issue regards protecting the position of users issuing queries. Strong location privacy renders the user position indistinguishable from any other location. This necessitates that every query, independently of its location, should retrieve the same amount of information, determined by the query with the maximum requirements. Consequently, the processing cost and the response time are prohibitively high for datasets of realistic sizes. In this paper, we propose a novel solution that offers both strong location privacy and efficiency by adjusting the accuracy of the query results. Our framework seamlessly combines the concepts of \(\epsilon \)-differential privacy and private information retrieval (PIR), exploiting query statistics to increase efficiency without sacrificing privacy. We experimentally show that the proposed approach outperforms the current state-of-the-art by orders of magnitude, while introducing only a small bounded error.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The size of each block depends on the PIR hardware.

  2. 2.

    There is a distinct query plan for every allowed value of k. For ease of presentation, we focus on a single value of k.

  3. 3.

    In this setting, there are several users, each holding a value, and they wish to publish the total sum, so that the value of any user is not revealed, even if an adversary has complete knowledge of all the remaining users.

  4. 4.

    SimpleGeo’s Places, available at http://freegisdata.rtwilson.com/.

References

  1. Ács, G., Castelluccia, C.: I have a DREAM! (DiffeRentially privatE smArt Metering). In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 118–132. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  2. Böhm, C.: A cost model for query processing in high dimensional data spaces. TODS 25(2), 129–178 (2000)

    Article  Google Scholar 

  3. Chan, T.-H.H., Shi, E., Song, D.: Private and continual release of statistics. TISSEC 14(3), 26:1–26:24 (2011)

    Article  Google Scholar 

  4. Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM (JACM) 45(6), 965–981 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  5. Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 152–170. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Duckham, M., Kulik, L.: Simulation of obfuscation and negotiation for location privacy. In: Cohn, A.G., Mark, D.M. (eds.) COSIT 2005. LNCS, vol. 3693, pp. 31–48. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Dwork, C.: A firm foundation for private data analysis. CACM 54(1), 86–95 (2011)

    Article  Google Scholar 

  8. Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486–503. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: STOC (2010)

    Google Scholar 

  10. Gasarch, W.: A survey on private information retrieval. Bull. EATCS 82, 72–107 (2004)

    MATH  MathSciNet  Google Scholar 

  11. Ghinita, G.: Privacy for location-based services. Synth. Lect. Inf. Secur. Priv. Trust 4(1), 1–85 (2013)

    Google Scholar 

  12. Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.-L.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD (2008)

    Google Scholar 

  13. Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: anonymous location-based queries in distributed mobile systems. In: WWW (2007)

    Google Scholar 

  14. Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719–1733 (2007)

    Article  Google Scholar 

  15. Khoshgozaran, A., Shahabi, C., Shirani-Mehr, H.: Location privacy; moving beyond k-anonymity, cloaking and anonymizers. KAIS 26, 435–465 (2010)

    Google Scholar 

  16. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS (2005)

    Google Scholar 

  17. Korn, F., Pagel, B.-U., Faloutsos, C.: On the ‘dimensionality curse’ and the ‘self-similarity blessing’. TKDE 13(1), 96–111 (2001)

    Google Scholar 

  18. Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 364–364. IEEE Computer Society (1997)

    Google Scholar 

  19. McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pp. 19–30. ACM (2009)

    Google Scholar 

  20. Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 763–774. VLDB Endowment (2006)

    Google Scholar 

  21. Ostrovsky, R., Skeith III, W.E.: A survey of single-database private information retrieval: techniques and applications. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 393–411. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  22. Pagel, B.-U., Korn, F., Faloutsos, C.: Deflating the dimensionality curse using multiple fractal dimensions. In: ICDE (2000)

    Google Scholar 

  23. Papadopoulos, S., Bakiras, S., Papadias, D.: Nearest neighbor search with strong location privacy. Proc. VLDB Endow. 3(1–2), 619–629 (2010)

    Article  Google Scholar 

  24. Shang, N., Ghinita, G., Zhou, Y., Bertino, E.: Controlling data disclosure in computational pir protocols. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 310–313. ACM (2010)

    Google Scholar 

  25. Sion, R., Carbunar, B.: On the computational practicality of private information retrieval. In: Proceedings of the Network and Distributed Systems Security Symposium (2007)

    Google Scholar 

  26. Wang, S., Agrawal, D., El Abbadi, A.: Generalizing PIR for practical private retrieval of public data. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. LNCS, vol. 6166, pp. 1–16. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  27. Williams, P., Sion, R.: Usable PIR. In: NDSS (2008)

    Google Scholar 

  28. Yiu, M.L., Jensen, C., Huang, X., Lu, H.: SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile systems. In: ICDE (2008)

    Google Scholar 

Download references

Acknowledgments

This work was supported by GRF grant 618011 from Hong Kong RGC.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dimitris Papadias .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Fung, E., Kellaris, G., Papadias, D. (2015). Combining Differential Privacy and PIR for Efficient Strong Location Privacy. In: Claramunt, C., et al. Advances in Spatial and Temporal Databases. SSTD 2015. Lecture Notes in Computer Science(), vol 9239. Springer, Cham. https://doi.org/10.1007/978-3-319-22363-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22363-6_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22362-9

  • Online ISBN: 978-3-319-22363-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics