skip to main content
10.1145/1869790.1869797acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

VeriPlace: a privacy-aware location proof architecture

Published: 02 November 2010 Publication History

Abstract

Recently, there has been a dramatic increase in the number of location-based services, with services like Foursquare or Yelp having hundreds of thousands of users. A user's location is a crucial factor for enabling these services. Many services rely on users to correctly report their location. However, if there is an incentive, users might lie about their location. A location proof architecture enables users to collect proofs for being at a location and services to validate these proofs. It is essential that this proof collection and validation does not violate user privacy. We introduce VeriPlace, a location proof architecture with user privacy as a key design component. In addition, VeriPlace can detect cheating users who collect proofs for places where they are not located. We also present an implementation and a performance evaluation of VeriPlace and its integration with Yelp.

References

[1]
http://mashable.com/2010/05/28/foursquare-checkins/. Accessed June 2010.
[2]
http://blog.foursquare.com/post/503822143/on-foursquare-cheating-and-claiming-mayorships-from. Accessed June 2010.
[3]
N. Ahmed and U. Ismail. Designing a High Performance WLAN Testbed for Centralized Control. In Proc. TridentCom 2009, pages 1--6.
[4]
S. Brands and D. Chaum. Distance-Bounding Protocols. In Proc. EUROCRYPT '93, pages 344--359.
[5]
V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless Device Identification with Radiometric Signatures. In Proc. MobiCom 2008, pages 116--127.
[6]
S. Căpkun, L. Buttyán, and J.-P. Hubaux. SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In Proc. SASN 2003, pages 21--32.
[7]
M. L. Damiani, E. Bertino, B. Catania, and P. Perlasca. GEO-RBAC: A Spatially Aware RBAC. TISSEC, 10(1), 2007.
[8]
D. E. Denning and P. F. MacDoran. Location-Based Authentication: Grounding Cyberspace for Better Security. pages 167--174, 1998.
[9]
D. Faria and D. Cheriton. No Long-term Secrets: Location Based Security in Overprovisioned Wireless LANs. In Proc. HotNets-III, 2004.
[10]
Foursquare. http://foursquare.com/.
[11]
P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall. Toward Trustworthy Mobile Sensing. In Proc. HotMobile 2010, pages 31--36.
[12]
A. I. González-Tablas Ferreres, B. R. Álvarez, and A. R. Garnacho. Guaranteeing the Authenticity of Location Information. IEEE Pervasive Computing, pages 72--80, Jul-Sept 2008.
[13]
Google Latitude. http://www.google.com/latitude/.
[14]
Gowalla. http://gowalla.com/.
[15]
Y. C. Hu, A. Perrig, and D. B. Johnson. Packet Leashes: a Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In Proc. INFOCOM 2003, pages 1976--1986.
[16]
IBM. IBM PCIe Cryptographic Coprocessor. http://www-03.ibm.com/security/cryptocards/pciecc/overview.shtml.
[17]
M. S. Kirkpatrick and E. Bertino. Enforcing Spatial Constraints for Mobile RBAC Systems. In Proc. SACMAT 2010, pages 99--108.
[18]
V. Lenders, E. Koukoumidis, P. Zhang, and M. Martonosi. Location-based Trust for Mobile User-generated Content: Applications, Challenges and Implementations. In Proc. HotMobile '08, pages 60--64.
[19]
W. Luo and U. Hengartner. Proving Your Location Without Giving up Your Privacy. In Proc. HotMobile 2010, pages 7--12.
[20]
OpenSSL. http://www.openssl.org/.
[21]
Parking Mobility. http://www.parkingmobility.com/.
[22]
PyCrypto. http://www.dlitz.net/software/pycrypto/.
[23]
S. Saroiu and A. Wolman. Enabling New Mobile Applications with Location Proofs. In Proc. HotMobile '09, pages 1--6.
[24]
S. Saroiu and A. Wolman. I Am a Sensor, and I Approve This Message. In Proc. HotMobile 2010, pages 37--42.
[25]
A. Sheth, S. Seshan, and D. Wetherall. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries. In Proc. Pervasive 2009, pages 274--290.
[26]
SimpleGeo. http://simplegeo.com/.
[27]
SOAPpy. http://pywebsvcs.sourceforge.net/.
[28]
Tor. http://www.torproject.org/.
[29]
B. Waters and E. Felten. Secure, Private Proofs of Location. Technical Report TR-667-03, Department of Computer Science, Princeton University, January 2003.
[30]
Yelp. http://www.yelp.com/.

Cited By

View all
  • (2023)Privacy-Preserving Proof-of-Location With Security Against Geo-TamperingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.312807320:1(131-146)Online publication date: 1-Jan-2023
  • (2022)SPMAC: Scalable Prefix Verifiable Message Authentication Code for Internet of ThingsIEEE Transactions on Network and Service Management10.1109/TNSM.2022.316965719:3(3453-3464)Online publication date: Sep-2022
  • (2022)Incentivizing WiFi-Based Multilateration Location VerificationIEEE Internet of Things Journal10.1109/JIOT.2021.30968209:4(3083-3096)Online publication date: 15-Feb-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GIS '10: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
November 2010
566 pages
ISBN:9781450304283
DOI:10.1145/1869790
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 November 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. location-based services
  2. mobile applications
  3. privacy

Qualifiers

  • Research-article

Conference

GIS '10
Sponsor:

Acceptance Rates

Overall Acceptance Rate 257 of 1,238 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)16
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Privacy-Preserving Proof-of-Location With Security Against Geo-TamperingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.312807320:1(131-146)Online publication date: 1-Jan-2023
  • (2022)SPMAC: Scalable Prefix Verifiable Message Authentication Code for Internet of ThingsIEEE Transactions on Network and Service Management10.1109/TNSM.2022.316965719:3(3453-3464)Online publication date: Sep-2022
  • (2022)Incentivizing WiFi-Based Multilateration Location VerificationIEEE Internet of Things Journal10.1109/JIOT.2021.30968209:4(3083-3096)Online publication date: 15-Feb-2022
  • (2022)Exploiting European GNSS and Ethereum in location proof systemsInternational Journal of Digital Earth10.1080/17538947.2022.208777515:1(1018-1037)Online publication date: 16-Jun-2022
  • (2021)MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed ConsensusSensors10.3390/s2115509621:15(5096)Online publication date: 28-Jul-2021
  • (2021)Comparative Analysis of Localization Techniques Used in LBS2021 5th International Conference on Computing Methodologies and Communication (ICCMC)10.1109/ICCMC51019.2021.9418232(300-304)Online publication date: 8-Apr-2021
  • (2021)Achieving Blockchain-based Privacy-Preserving Location Proofs under Federated LearningICC 2021 - IEEE International Conference on Communications10.1109/ICC42927.2021.9500728(1-6)Online publication date: Jun-2021
  • (2021)A Survey in Localization Techniques Used in Location-based Access Control2021 IEEE World AI IoT Congress (AIIoT)10.1109/AIIoT52608.2021.9454195(0427-0432)Online publication date: 10-May-2021
  • (2021)Personalized Privacy Protection SolutionsPersonalized Privacy Protection in Big Data10.1007/978-981-16-3750-6_4(23-130)Online publication date: 24-Jul-2021
  • (2020)Location Proof Systems for Smart Internet of Things: Requirements, Taxonomy, and Comparative AnalysisElectronics10.3390/electronics91117769:11(1776)Online publication date: 26-Oct-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media