skip to main content
10.1145/2996890.3007872acmotherconferencesArticle/Chapter ViewAbstractPublication PagesuccConference Proceedingsconference-collections
short-paper

Privacy-preserving location-based service based on deniable authentication

Published:06 December 2016Publication History

ABSTRACT

Location-based Services (LBS) are a kind of important applications which identify the resources close to users, i.e. return the nearest gas stations, restaurants, banks etc, as well as identification of the optimal route to reach destination according to user position. However, privacy threat is the inherent problem in LBS as the location data is very effective for service provisioning. Thus, we focus on the privacy issue. We apply the deniable authentication to LBS. Intuitively, user is not afraid of his location data exposure to service provider (SP) for service request since SP has no evidence to show user's request to any third party under the deniable authentication. In this way, it is not necessary for user to provide coarse location information which would degrade the service quality certainly.

References

  1. R. Abbas, K. Michael, M. G. Michael, Location-based Privacy, Protection, Safety, and Security, Privacy in a Digital, Networked World, 391--414, 2015Google ScholarGoogle Scholar
  2. X. Chen, Y. Mu, Preserving user location privacy for location-based service, GPC 2016, LNCS 9663, 290--300, 2016Google ScholarGoogle Scholar
  3. R. Cheng, Y. Zhang, E. Bertino and S. Prabhakar, Preserving user location privacy in mobile data management infrastructures, Privacy Enhancing Technology Workshop, 393--412, 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. I. Damgard, Towards practical public key systems secure against chosen ciphertext attack, In: Crypto 1992, LNCS 576, 445--456, 1992 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Dowsley, G. Hanaoka, H. Imai and Anderson C.A. Nascimento, Round-optimal deniable ring authentication in the presence of big brother, In: WISA, LNCS 6513, 307--321, 2011 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Dwork, M. Naor and A. Sahai, Concurrent zero-knowledge, In: STOC, 409--418, 1998 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Dwork, M. Naor and A. Sahai, Concurrent zero-knowledge, Journal of the ACM, 51(6), 851--898, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi and K. L. Tan, Private queries in location based services: anonymizers are not necessary, In: SIGMOD, 121--132, 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Khoshgozaran and C. Shahabi, Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy, In: SSTD 2007, LNCS 4605, 239--257, 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Khoshgozaran, H. Shirani-Mehr and C. Shahabi, SPIRAL, a scalable private information retrieval approach to location privacy, In: MDM 2008, 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. H. Krawczyk and T. Rabin, Chameleon hashing and signautres, In: NDSS, 143--154, 2000Google ScholarGoogle Scholar
  12. F. Li, P. Xiong and C. Jin, Identity-based deniable authentication for ad hoc networks, Computing 96, 843--853, 2014 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Lu, C. S. Jensen and M. L. Yiu, PAD: Privacy-area aware, dummy-based location privacy in mobile services, In: MobiDE, 16--23, 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Mascetti, C.Bettini, D. Freni, X. S. Wang and S. Jajodia, Privacy-aware proximity based services, In: MDM, 1140--1143, 2009 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Naor, Deniable ring authentication, In: Crypto, LNCS 2442, 481--498, 2002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. L. Yiu, C.S. Jensen, X. Huang and H. Lu, Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services, In: ICDE 2008, 366--375, 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. W. Susilo and Y. Mu, Non-interactive deniable ring authentication, In: ICISC, LNCS 2971, 386--401, 2004Google ScholarGoogle Scholar
  18. L. Wang, G. Zhang and C. Ma, Id-based deniable ring authentication with constant-size signature, Frontiers of Computer Science in China 2(1), 106--112, 2008Google ScholarGoogle ScholarCross RefCross Ref
  19. S. Zeng, Y. Chen, S. Tan and M.He, Concurrently deniable ring authentication and its application to LBS in VANETs, Peer-to-Peer Networking and Applications, Springer, 2016Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    UCC '16: Proceedings of the 9th International Conference on Utility and Cloud Computing
    December 2016
    549 pages
    ISBN:9781450346160
    DOI:10.1145/2996890

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 6 December 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • short-paper

    Acceptance Rates

    Overall Acceptance Rate38of125submissions,30%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader