ABSTRACT
Mobile users engage in novel and exciting location-based social media applications (e.g., geosocial networks, spatial crowdsourcing) in which they interact with other users situated in their proximity. In several application scenarios, users define their own proximity zones of interest (typically in the form of polygonal regions, such as a collection of city blocks), and want to find other users with whom they are in a mutual enclosure relationship with respect to their respective proximity zones. This boils down to evaluating two point-in-polygon enclosure conditions, which is easy to achieve for revealed user locations and proximity zones. However, users may be reluctant to share their whereabouts with their friends and with social media service providers, as location data can help one infer sensitive details such as an individual's health status, financial situation or lifestyle choices. In this paper, we propose a mechanism that allows users to securely evaluate mutual proximity zone enclosure on encrypted location data. Our solution uses homomorphic encryption, and supports convex polygonal proximity zones. We provide a security analysis of the proposed solution, we investigate performance optimizations, and we show experimentally that our approach scales well for datasets of millions of users.
- NIST FIPS 197 - Advanced Encryption Standard (AES). National Institute of Standards and Technology, 2001.Google Scholar
- M. J. Atallah and W. Du. Secure multi-party computational geometry. In WADS Conference Proceedings, pages 165--179. LNCS, 2001. Google ScholarDigital Library
- S. Choi, G. Ghinita, H.-S. Lim, and E. Bertino. Secure knn query processing in untrusted cloud environments. IEEE Transactions on Knowledge and Data Engineering, Jan 2014.Google Scholar
- T. Elgamal. A public-key cryptosystem and a signature scheme based on discrete logarithm. IEEE Transactions on Information and Theory, 1985. Google ScholarDigital Library
- B. Gedik and L. Liu. Location privacy in mobile systems: A personalized anonymization model. In ICDCS Conference Proceedings, pages 620--629. IEEE, June 2005. Google ScholarDigital Library
- C. Gentry and Z. Ramzan. Single-database private information retrieval with constant communication rate. In Automata, Languages and Programming Conference Proceedings, pages 803--815. LNCS, 2005. Google ScholarDigital Library
- G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino. Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection. Geoinformatica, Dec 2010. Google ScholarDigital Library
- G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan. Private queries in location based services: Anonymizers are not necessary. In SIGMOD Conference Proceedings, pages 121--132. ACM, June 2008. Google ScholarDigital Library
- M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys Conference Proceedings, pages 31--42. ACM, 2003. Google ScholarDigital Library
- H. Hu, J. Xu, C. Ren, and B. Choi. Processing private queries over untrusted data cloud through privacy homomorphism. In ICDE Conference Proceedings, pages 601--612. IEEE, April 2011. Google ScholarDigital Library
- H. Hu, J. Xu, X. Xu, K. Pei, B. Choi, and S. Zhou. Private search on key-value stores with hierarchical indexes. In ICDE Conference Proceedings. IEEE, 2014.Google ScholarCross Ref
- P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. IEEE TKDE, 2007. Google ScholarDigital Library
- A. Khoshgozaran and C. Shahabi. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In SSTD Conference Proceedings, pages 239--257. LNCS, 2007. Google ScholarDigital Library
- H.-Y. Lin and W.-G. Tzeng. An efficient solution to the millionaires problem based on homomorphic encryption. In ACNS, pages 456--466. Springer, January 2005. Google ScholarDigital Library
- X. Lin, H. Hu, H. P. Li, J. Xu, and B. Choi. Private proximity detection and monitoring with vicinity regions. In MobiDE Conference Proceedings, pages 5--12. ACM, June 2013. Google ScholarDigital Library
- Y.-L. Luo, L.-S. Huang, and H. Zhong. Secure two-party point-circle inclusion problem. In Journal of Computer Science and Technology, pages 88--91. LNCS, Jan 2007. Google ScholarDigital Library
- S. Mascetti, C. Bettini, D. Freni, X. S. Wang, and S. Jajodia. Privacy-aware proximity based services. In MDM Conference, pages 31--40. IEEE, 2009. Google ScholarDigital Library
- M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: Query processing for location services without compromising privacy. In VLDB Conference Proceedings, pages 763--774. VLDB, Sep 2006. Google ScholarDigital Library
- B. Mu and S. Bakiras. Private proximity detection for convex polygons. In MobiDE Conference Proceedings, pages 36--43. ACM, June 2013. Google ScholarDigital Library
- M. Naor and B. Pinkas. Oblivious transfer with adaptive queries. In Advances in Cryptology, pages 573--590. LNCS, 1999. Google ScholarDigital Library
- A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh. Location privacy via private proximity testing. In NDSS Conference Proceedings, pages 1--17. ISOC, Feb 2011.Google Scholar
- R. Paulet, M. G. Kaosar, X. Yi, and E. Bertino. Privacy-preserving and content-protecting location based queries. In IEEE Conference Proceedings, pages 44--55. IEEE, 2012. Google ScholarDigital Library
- R. A. Popa, F. H. Li, and N. Zeldovich. An ideal-security protocol for order-preserving encoding. In Security and Privacy, pages 1--20. IEEE, 2013. Google ScholarDigital Library
- L. Siksnys, J. R. Thomsen, S. Saltenis, and M. L. Yiu. Private and flexible proximity detection in mobile social networks. In MDM Conference Proceedings, pages 75--84. IEEE, 2010. Google ScholarDigital Library
- W. K. Wong, D. W. Cheung, B. Kao, and N. Mamoulis. Secure knn computaiton on encrypted databases. In SIGMOD Conference Proceedings, pages 1--12. ACM, June 2009. Google ScholarDigital Library
- A. C. Yao. Protocols for secure computations. In SFCS Conference Proceedings. IEEE, 1982. Google ScholarDigital Library
- B. Yao, F. Li, and X. Xiao. Secure nearest neighbor revisited. In ICDE Conference Proceedings, pages 733--744. IEEE, April 2013. Google ScholarDigital Library
Index Terms
- Secure mutual proximity zone enclosure evaluation
Recommendations
Universal location referencing and homomorphic evaluation of geospatial query
AbstractLocation data reveals users’ trajectories, yet it is often shared to enable many location-based services (LBS). In this paper, we propose a privacy-preserving geospatial query system with geo-hashing and somewhat homomorphic ...
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data
Cryptology and Network SecurityAbstractReachability, which answers whether one person is reachable from another through a sequence of contacts within a period of time, is of great importance in many domains such as social behavior analysis. Recently, with the prevalence of various ...
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
In homomorphic encryption schemes, anyone can perform homomorphic operations, and therefore, it is difficult to manage when, where and by whom they are performed. In addition, the property that anyone can "freely" perform the operation inevitably means ...
Comments