Abstract
Mobile users frequently change their location and often desire to avail of location-based services (LBS). LBS server provides services to users at the service charge. The user queries the LBS server for services, and the LBS server replies queries’ answer with the associated fee. This exchange may breach the user’s privacy. Users’ query privacy and LBS server services’ privacy is a challenging issue. Many privacy-preserving LBS schemes have been proposed, such as trusted third party, homomorphic encryption, and private information retrieval. These existing schemes mostly suffer from poor efficiency and privacy issue. We propose an efficient privacy-preserving scheme for location-based services (EP2LBS) using a lattice-based oblivious transfer protocol. The proposed EP2LBS scheme’s security depends on the combination of decisional ring-learning with errors assumption and perfect secrecy assumption. This enables the EP2LBS scheme to preserve the user’s query privacy and LBS server’s services privacy. The theoretical and experimental results show that the EP2LBS scheme requires lower communication and computation costs at server and user as compared to the current-state-of-the-art schemes.


Similar content being viewed by others
Data Availability
Not applicable
References
Bi B, Huang D, Mi B, Deng Z, Pan H (2019) Efficient lbs security-preserving based on ntru oblivious transfer. Wirel Pers Commun, 1–12
Chen J, He K, Yuan Q, Chen M, Du R, Xiang Y (2018) Blind filtering at third parties: an efficient privacy-preserving framework for location-based services. IEEE Trans Mob Comput 17(11):2524–2535
Chow CY, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, 171–178. ACM
Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: International Conference on Pervasive Computing, pp 152–170. Springer
Gedik B, Liu L (2007) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput 7(1):1–18
Ghinita G, Kalnis P, Kantarcioglu M, Bertino E (2009) A hybrid technique for private location-based queries with database protection. In: International Symposium on Spatial and Temporal Databases, pp 98–116. Springer
Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp 121–132. ACM
Ghinita G, Kalnis P, Skiadopoulos S (2007) Mobihide: a mobilea peer-to-peer system for anonymous location-based queries. In: International Symposium on Spatial and Temporal Databases, pp 221–238. Springer
Hu Q, Wang S, Hu C, Huang J, Li W, Cheng X (2018) Messages in a concealed bottle: Achieving query content privacy with accurate location-based services. IEEE Trans Veh Technol 67(8):7698–7711
Hu Z, Liu S, Chen K (2018) Privacy-preserving location-based services query scheme against quantum attacks. IEEE Trans Dependable Secure Comput 17(5):972–983
Jannati H, Bahrak B (2017) An oblivious transfer protocol based on elgamal encryption for preserving location privacy. Wireless Pers Commun 97(2):3113–3123
Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719–1733
Li X, Zhu Y, Wang J (2019) Highly efficient privacy preserving location-based services with enhanced one-round blind filter. IEEE Trans Emerg Topics Comput 9(4):1803–14
Lindell AY (2009) Adaptively secure two-party computation with erasures. In: Cryptographers’ Track at the RSA Conference, pp 117–132. Springer
Paulet R, Kaosar MG, Yi X, Bertino E (2013) Privacy-preserving and content-protecting location based queries. IEEE Trans Knowl Data Eng 26(5):1200–1210
Peikert C (2014) Lattice cryptography for the internet. In: International Workshop on Post-Quantum Cryptography, pp 197–219. Springer
Singh V (2015) A practical key exchange for the internet using lattice cryptography. IACR Cryptol ePrint Archive 2015:138
Yadav VK, Andola N, Verma S, Venkatesan S (2021) P2lbs: privacy provisioning in location-based services. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2021.3123428
Yadav VK, Verma S, Venkatesan S (2020) Efficient and secure location-based services scheme in vanet. IEEE Trans Veh Technol 69(11):13567–13578
Yadav VK, Verma S, Venkatesan S (2021) An efficient and light weight polynomial multiplication for ideal lattice-based cryptography. Multimed Tools Appl 80(2):3089–3120
Yadav VK, Verma S, Venkatesan S (2021) Linkable privacy-preserving scheme for location-based services. IEEE Trans Intell Transp Syst. https://doi.org/10.1109/TITS.2021.3074974
Zhang S, Wang G, Bhuiyan MZA, Liu Q (2018) A dual privacy preserving scheme in continuous location-based services. IEEE Internet Things J 5(5):4191–4200
Funding
None
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Not applicable
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Code availability
Not applicable
Ethics approval
Not applicable
Consent to participate
Not applicable
Consent for publication
Not applicable
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yadav, V.K., Andola, N., Verma, S. et al. EP2LBS: efficient privacy-preserving scheme for location-based services. J Supercomput 78, 14991–15013 (2022). https://doi.org/10.1007/s11227-022-04486-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04486-4