ABSTRACT
In this work, we define the Nearest Doctor Problem (NDP) for finding the closest doctor in case of an emergency and present a secure multi-party computation for solving it. The solution is based on a privacy-preserving cryptographic protocol and makes use of the current location of each participating doctor. The protocol is efficient and protects the privacy of the location of all doctors. A prototype implementing the proposed solution for a community of doctors that use mobile devices to obtain their current location is presented.
- A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. De Capitani di Vimercati. Digital privacy. Auerbach Publications, Taylor & Francis Group, 6000 Broken Sound ParkWay NW, 2008. Google ScholarDigital Library
- D. Bickson, D. Dolev, G. Bezman, and B. Pinkas. Peer-to-peer secure multi-party numerical computation. Peer-to-Peer Computing, IEEE International Conference on, 0:257--266, 2008. Google ScholarDigital Library
- A. Chi-Chih Yao. Protocols for secure computations. In Proceedings of Twenty-third IEEE Symposium on Foundations of Computer Science, pages 160--164. Chicago, Illinois, November 1982. Google ScholarDigital Library
- V. Ciriani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati. Advances in Information Security, volume 33. Springer US, 2007.Google Scholar
- R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, pages 303--320, August 2004. Google ScholarDigital Library
- P. S. Efraimidis, G. Drosatos, F. Nalbadis, and A. Tasidou. Towards privacy in personal data management. Journal on Information Management & Computer Security, 17(4), 2009.Google Scholar
- Europe's Information Society. eSafety, November 2009. http://ec.europa.eu/esafety.Google Scholar
- D. Hook. Beginning Cryptography with Java. Wiley Publishing, Inc., Indianapolis, In 46256, USA, 2005. Google ScholarDigital Library
- A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA, 1997. Google ScholarDigital Library
- N. B. Priyantha, A. Chakraborty, and H. Balakrishnan. The cricket location-support system. In 6th ACM MOBICOM, Boston, MA, August 2000. Google ScholarDigital Library
- M. Reed, P. Syverson, and D. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4), 1998. Google ScholarDigital Library
- G. Stamatelatos, G. Drosatos, and P. S. Efraimidis. Quantum: A peer-to-peer network for distributed computations with enhanced privacy. In EYRHKA 2009 Conference Proceedings, pages 201--210. 3rd Pan-hellenic Scientific Student Conference on Informatics, September 2009.Google Scholar
- I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In ACM SIGCOMM'01, pages 149--160. San Diego, CA, August 2001. Google ScholarDigital Library
- R. Want, A. Hopper, a. Veronica Falc and J. Gibbons. The active badge location system. ACM Transactions on Information Systems (TOIS), 10(1):91--102, 1992. Google ScholarDigital Library
- A. Ward, A. Jones, and A. Hopper. A new location technique for the active office. IEEE Personal Communications, 4(5):42--47, October 1997.Google Scholar
- Wikipedia. Onion routing, November 2009. http://en.wikipedia.org/wiki/Onion_routing.Google Scholar
- M. Yokoo and K. Suzuki. Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions. In AAMAS'02. Bologna, Italy, July 2002. Google ScholarDigital Library
Index Terms
- A privacy-preserving protocol for finding the nearest doctor in an emergency
Recommendations
An efficient privacy-preserving solution for finding the nearest doctor
In this work, we define the Nearest Doctor Problem for finding the nearest doctor in case of an emergency and present a privacy-preserving protocol for solving it. The solution is based on cryptographic primitives and makes use of the current location ...
Preserving location privacy without exact locations in mobile services
Privacy preservation has recently received considerable attention in location-based services (LBSs). A large number of location cloaking algorithms have been proposed for protecting the location privacy of mobile users. However, most existing cloaking ...
An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy
Location based services (LBS) are applications that require a client's geographical location to provide a service or a piece of information that is related to the client at that location. Although LBSs promise safety and convenience, they threaten the ...
Comments