ABSTRACT
Location-based Services (LBS) are a kind of important applications which identify the resources close to users, i.e. return the nearest gas stations, restaurants, banks etc, as well as identification of the optimal route to reach destination according to user position. However, privacy threat is the inherent problem in LBS as the location data is very effective for service provisioning. Thus, we focus on the privacy issue. We apply the deniable authentication to LBS. Intuitively, user is not afraid of his location data exposure to service provider (SP) for service request since SP has no evidence to show user's request to any third party under the deniable authentication. In this way, it is not necessary for user to provide coarse location information which would degrade the service quality certainly.
- R. Abbas, K. Michael, M. G. Michael, Location-based Privacy, Protection, Safety, and Security, Privacy in a Digital, Networked World, 391--414, 2015Google Scholar
- X. Chen, Y. Mu, Preserving user location privacy for location-based service, GPC 2016, LNCS 9663, 290--300, 2016Google Scholar
- R. Cheng, Y. Zhang, E. Bertino and S. Prabhakar, Preserving user location privacy in mobile data management infrastructures, Privacy Enhancing Technology Workshop, 393--412, 2006 Google ScholarDigital Library
- I. Damgard, Towards practical public key systems secure against chosen ciphertext attack, In: Crypto 1992, LNCS 576, 445--456, 1992 Google ScholarDigital Library
- R. Dowsley, G. Hanaoka, H. Imai and Anderson C.A. Nascimento, Round-optimal deniable ring authentication in the presence of big brother, In: WISA, LNCS 6513, 307--321, 2011 Google ScholarDigital Library
- C. Dwork, M. Naor and A. Sahai, Concurrent zero-knowledge, In: STOC, 409--418, 1998 Google ScholarDigital Library
- C. Dwork, M. Naor and A. Sahai, Concurrent zero-knowledge, Journal of the ACM, 51(6), 851--898, 2004 Google ScholarDigital Library
- G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi and K. L. Tan, Private queries in location based services: anonymizers are not necessary, In: SIGMOD, 121--132, 2008 Google ScholarDigital Library
- A. Khoshgozaran and C. Shahabi, Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy, In: SSTD 2007, LNCS 4605, 239--257, 2007 Google ScholarDigital Library
- A. Khoshgozaran, H. Shirani-Mehr and C. Shahabi, SPIRAL, a scalable private information retrieval approach to location privacy, In: MDM 2008, 2008 Google ScholarDigital Library
- H. Krawczyk and T. Rabin, Chameleon hashing and signautres, In: NDSS, 143--154, 2000Google Scholar
- F. Li, P. Xiong and C. Jin, Identity-based deniable authentication for ad hoc networks, Computing 96, 843--853, 2014 Google ScholarDigital Library
- H. Lu, C. S. Jensen and M. L. Yiu, PAD: Privacy-area aware, dummy-based location privacy in mobile services, In: MobiDE, 16--23, 2008 Google ScholarDigital Library
- S. Mascetti, C.Bettini, D. Freni, X. S. Wang and S. Jajodia, Privacy-aware proximity based services, In: MDM, 1140--1143, 2009 Google ScholarDigital Library
- M. Naor, Deniable ring authentication, In: Crypto, LNCS 2442, 481--498, 2002 Google ScholarDigital Library
- M. L. Yiu, C.S. Jensen, X. Huang and H. Lu, Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services, In: ICDE 2008, 366--375, 2008 Google ScholarDigital Library
- W. Susilo and Y. Mu, Non-interactive deniable ring authentication, In: ICISC, LNCS 2971, 386--401, 2004Google Scholar
- L. Wang, G. Zhang and C. Ma, Id-based deniable ring authentication with constant-size signature, Frontiers of Computer Science in China 2(1), 106--112, 2008Google ScholarCross Ref
- S. Zeng, Y. Chen, S. Tan and M.He, Concurrently deniable ring authentication and its application to LBS in VANETs, Peer-to-Peer Networking and Applications, Springer, 2016Google Scholar
Recommendations
New Approach for Privacy-Aware Location-Based Service Communications
Location-based services (LBS) are very popular for personal communications in the mobile Internet. In such applications, users make use of the mobile devices to obtain the information of the nearest gas stations, restaurants, banks etc from service ...
Efficient deniable authentication and its application in location-based services
AbstractDeniable authentication (DA) assures message authentication between sets of participants. The actual participants can be certain about the messages’ authenticity but cannot prove it to any third party after the event. In applications ...
Graphical abstractDisplay Omitted
Highlights- Heterogenous deniable authentication schemes assure privacy in location-based systems.
A non-interactive deniable authentication scheme based on designated verifier proofs
A deniable authentication protocol enables a receiver to identify the source of the given messages but unable to prove to a third party the identity of the sender. In recent years, several non-interactive deniable authentication schemes have been ...
Comments