Abstract
Location-based services (LBSs) allow users to ask location-dependent queries and receive information based on their location. A group of users can send a group-nearest-neighbor (GNN) query in order to receive a Point Of Interest (POI). This POI in turn shows a point which is the minimum distance from all members of the group. To benefit from these services, it is important to preserve the location privacy of each group user from others in the group (Intragroup location privacy) as well as from anyone outside of the group, including the LBS, (Intergroup location privacy). It may also be necessary to protect the location privacy of the resulting POI from the LBS and other possible attackers. In this paper, we propose two different privacy-preserving protocols for finding the exact answer to a GNN query among a set of returned POIs. The first protocol assumes a semi-honest model while the second one works in a malicious model. The proposed protocols are based on the Anonymous Veto network and Burmester–Desmedt key establishment protocols. The security analysis shows that the proposed protocols provide both Intragroup and Intergroup location privacy; they also protect the location privacy of the resulting POI and are resistant to collusion and multi-point aggregate distance attacks. The performed analyses indicate that they incur a constant computation cost per user and are efficient in terms of computation and communication costs.
Similar content being viewed by others
Notes
Group Location Privacy.
References
Papadias, D., Tao, Y., Mouratidis, K., & Kit Hui, C. (2005). Aggregate nearest neighbor queries in spatial databases. ACM Transactions on Database Systems (TODS), 30(2), 529–576.
Ashouri-Talouki, M., Baraani-Dastjerdi, A., & Selçuk, A. A. (2012). GLP: A cryptographic approach for group location privacy. Computer Communications, 35(12), 1527–1533.
Hashem, T., Kulik, L., & Zhang, R. (2010). Privacy preserving group nearest neighbor queries. In Proceedings of the 13th ACM international conference on extending database technology (pp. 489–500).
Huang, Y., & Vishwanathan, R. (2010). Privacy preserving group nearest neighbour queries in location-based services using cryptographic techniques. In IEEE GLOBECOM (pp. 1–5).
Ashouri-Talouki, M., Baraani-Dastjerdi, A. B., & Selçuk, A. A. (2013). Preserving location privacy for a group of users. Turkish Journal of Electrical Engineering & Computer Sciences, 21, 1857–1870.
Ashouri-Talouki, M., Baraani-Dastjerdi, A. B., & Selçuk, A. A. (2015). The Cloaked-Centroid protocol: Location privacy protection for a group of users of location-based services. Knowledge and Information Systems, 45(3), 589–615.
Khan, A. M. R., Hashem, T., Tanin, E., & Kulik, L. (2014). Location oblivious privacy protection for group nearest neighbor queries. In GIScience’14. Lecture notes in computer science (Vol. 8728, pp. 301–317).
Hao, F., & Zielinski, P. (2006). A 2-round anonymous veto protocol. In Proceedings of the 14th international workshop on security protocols, Cambridge. Lecture notes in computer science (Vol. 5087, pp. 202–211).
Paillier, P., & Pointcheval, D. (1999). Efficient public-key cryptosystems provably secure against active adversaries. In Advances in cryptology (ASIACRYPT).
Burmester, M., & Desmedt, Y. (1994). A secure and efficient conference key distribution system. In Advances in cryptology (EUROCRYPT’94) (pp. 275–286).
Sheikh, R., Kumar, B., & Mishra, D. K. (2010). A Distributed k-secure sum protocol for secure multi-party computations. Journal of Computing, 2(3), 68–72.
Jung, T., & Li, X. Y. (2015). Collusion-tolerable privacy-preserving sum and product calculation without secure channel. IEEE Transactions on Dependable and Secure Computing, 12(1), 45–57.
Schnorr, C. P. (1991). Efficient signature generation by smart cards. Journal of Cryptology, 4(3), 161–174.
Beresford, A. R., & Stajano, F. (2004). Mix zones: User privacy in location-aware services. In Proceedings of the second IEEE annual conference on pervasive computing and communications workshops, 2004.
Gedik, B., & Liu, L. (2008). Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing, 7(1), 1–18.
Chow, C. Y., Mokbel, M. F., & Liu, X. (2006). A peer to peer spatial cloaking algorithm for anonymous location based services. In GIS ‘06 Proceedings of the 14th annual ACM international symposium on advances in geographic information systems (pp. 171–178). ACM.
Bao, J., Chen, H., & Ku, W. S. (2009). PROS: A peer-to-peer system for location privacy protection on road networks. In ACM GIS’. ACM.
Hu, H., & Xu, J. (2009). Non-exposure location anonymity. In IEEE international conference on data engineering (ICDE’09) (pp. 1120–1131).
Solanas, A., & Balleste, A. M. (2008). A TTP-free protocol for location privacy in location-based services. Computer Communications, 31, 1181–1191.
Chow, C. Y., Mokbel, M. F., & Aref, W. G. (2009). Casper*: Query processing for location services without compromising privacy. ACM Transactions on Database Systems (TODS), 34(4), 1–48.
Chow, C. Y., Mokbel, M. F., & Liu, X. (2011). Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica, 15(2), 351–380.
Ghinita, G., Kalnis, P., & Skiadopoulos, S. (2007). MobiHide: A mobile peer-to-peer system for anonymous location-based queries. In Proceedings of international symposium on advances in spatial and temporal databases (SSTD’07) (pp. 221–238).
Ghinita, G., Kalnis, P., & Skiadopoulos, S. (2007). PRIVÉ: Anonymous location-based queries in distributed mobile systems. In Proceedings of international conference on world wide web (pp. 371–389).
Ghinita, G., Kalnis, P., Kantarcioglu, M., & Bertino, E. (2009). A hybrid technique for private location-based queries with database protection. In Proceedings of international symposium on advances in spatial and temporal databases (SSTD’09). Lecture notes in computer science (Vol. 5644, pp. 98–116).
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., & Tan, K.-L. (2008). Private queries in location based services: Anonymizers are not necessary. In Proceedings of the ACM international conference on management of data (SIGMOD’08) (pp. 121–132).
Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of on mobile systems, applications and services (pp. 31–42).
Kalnis, P., Ghinita, G., & Mouratidis, K. (2007). Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 19(12), 1719–1733.
Khoshgozaran, A., Shahabi, C., & Shirani-Mehr, H. (2011). Location privacy: Going beyond K-anonymity, cloaking and anonymizers. Knowledge and Information Systems, 26(3), 435–465.
Khoshgozaran, A., & Shahabi, C. (2007). Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In Proceedings of international conference on advances in spatial and temporal databases (SSTD’07) (pp. 239–257).
Mokbel, M. F. (2007). Privacy in location-based services: State-of-the-art and research directions. In IEEE international conference on mobile data management, MDM 2007, Mannheim, Germany (3-hours tutorial).
Olumofin, F., Tysowski, P. K., Goldberg, I., & Hengartner, U. (2010). Achieving efficient query privacy for location based services. In Proceedings of the 10th international conference on privacy enhancing technologies (PETS’10) (pp. 93–110).
Solanas, A., Domingo-Ferrer, J., Martínez-& Ballesté, A. (2008). Location privacy in location-based services: Beyond TTP-based schemes. In Proceeding of 1st international workshop on privacy in location-based applications (PILBA) within 13th European symposium on research in computer security (ESORICS) (pp. 12–23).
Papadopoulos, S., Bakiras, S., & Papadias, D. (2010). Nearest neighbor search with strong location privacy. In Proceedings of the VLDB endowment (Vol. 3, No. 1–2).
Naor, M., & Pinkas, B. (2001). Efficient oblivious transfer protocols. In ACM-SIAM symposium on discrete algorithms, SODA’01 (pp. 448–457). Society for Industrial and Applied Mathematics.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Azizi, S., Ashouri-Talouki, M. & Mala, H. Efficient privacy-preserving group-nearest-neighbor queries with the presence of active adversaries. Wireless Netw 25, 4799–4814 (2019). https://doi.org/10.1007/s11276-018-1768-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-018-1768-2