Skip to main content

Preserving User Location Privacy for Location-Based Service

  • Conference paper
  • First Online:
Book cover Green, Pervasive, and Cloud Computing

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9663))

Abstract

Location privacy has been a great concern to users who need the location based service on networked devices such as mobile phones and personal computers. Location based service usually relies on a location server, which is commonly regarded as semi-trusted or honest-but-curious. To protect user privacy their location information must be protected against the location server. We propose a protocol which captures user location privacy, while the user can still receive the requested service from a service provider, and does not reveal the user’s exact location to the location server. Our approach offers the applicability to real-world applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ashouri-Talouki, M., Baraani-Dastjerdi, A., Selçuk, A.A.: GLP: a cryptographic approach for group location privacy. Comput. Commun. 35(12), 1527–1533 (2012)

    Article  Google Scholar 

  2. Bilogrevic, I., Jadliwala, M., Joneja, V., Kalkan, K., Hubaux, J., Aad, I.: Privacy-preserving optimal meeting location determination on mobile devices. IEEE Trans. Inf. Forensics Secur. 9(7), 1141–1156 (2014)

    Article  Google Scholar 

  3. Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 393–412. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  5. Chow, C.-Y., Mokbel, M.F.: Enabling private continuous queries for revealed user locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Damiani, M.L., Bertino, E., Silvestri, C.: Protecting location privacy through semantics-aware obfuscation techniques. In: Trust Management II–Proceedings of IFIPTM : Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18–20, 2008, Trondheim, Norway, pp. 231–245 (2008)

    Google Scholar 

  7. Gahi, Y., Guennoun, M., Guennoun, Z., El-Khatib, K.: Privacy preserving scheme for location-based services. J. Inf. Secur. 3(2), 105–112 (2012)

    Article  Google Scholar 

  8. Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: 25th International Conference on Distributed Computing Systems (ICDCS 2005), 6–10, June 2005 Columbus, OH, USA, pp. 620–629 (2005)

    Google Scholar 

  9. Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)

    Article  Google Scholar 

  10. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC, Bethesda, MD, USA, May 31–June 2, 2009, pp. 169–178 (2009)

    Google Scholar 

  11. Gentry, C., Ramzan, Z.: Single-database private information retrieval with constant communication rate. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 803–815. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Ghinita, G.: Private queries and trajectory anonymization: a dual perspective on location privacy. Trans. Data Priv. 2(1), 3–19 (2009)

    MathSciNet  Google Scholar 

  13. Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.-L.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008 (2008)

    Google Scholar 

  14. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the First International Conference on Mobile Systems, Applications, and Services, MobiSys, San Francisco, CA, USA, 5–8 May 2003

    Google Scholar 

  15. Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Secur. Priv. 2(2), 28–34 (2004)

    Article  Google Scholar 

  16. Hashem, T., Kulik, L.: “don’t trust anyone”: Privacy protection for location-based services. Pervasive Mob. Comput. 7(1), 44–59 (2011)

    Article  Google Scholar 

  17. Herrmann, M., Rial, A., Díaz, C., Preneel, B.: Practical privacy-preserving location-sharing based services with aggregate statistics. In: 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2014, Oxford, United Kingdom, 23–25 July, pp. 87–98 (2014)

    Google Scholar 

  18. Mokbel, M.F., Chow, C., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea, 12–15 September, pp. 763–774 (2006)

    Google Scholar 

  19. Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6–9 February 2011

    Google Scholar 

  20. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Google Scholar 

  21. Sedenka, J., Gasti, P.: Privacy-preserving distance computation and proximity testing on earth, done right. In: 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2014, Kyoto, Japan, 03–06 June, pp. 99–110 (2014)

    Google Scholar 

  22. Stehlé, D., Steinfeld, R.: Faster fully homomorphic encryption. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 377–394. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  23. Sun, Y., Porta, T.F.L., Kermani, P.: A flexible privacy-enhanced location-based services system framework and practice. IEEE Trans. Mob. Comput. 8(3), 304–321 (2009)

    Article  Google Scholar 

  24. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  25. Teerakanok, S., Vorakulpipat, C., Kamolphiwong, S.: Anonymity preserving framework for location-based information services. In: International ACM Conference on Management of Emergent Digital EcoSystems MEDES 2010, Bangkok, Thailand, 26–29 October, pp. 107–113 (2010)

    Google Scholar 

Download references

Acknowledgment

This work was supported by “Fundamental Research Funds for the Central Universities” of China (No.XDJK2016C108) and the youth fund of Southwest University (No. 20700907).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yi Mu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Chen, X., Mu, Y. (2016). Preserving User Location Privacy for Location-Based Service. In: Huang, X., Xiang, Y., Li, KC. (eds) Green, Pervasive, and Cloud Computing. Lecture Notes in Computer Science(), vol 9663. Springer, Cham. https://doi.org/10.1007/978-3-319-39077-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-39077-2_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-39076-5

  • Online ISBN: 978-3-319-39077-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics