ABSTRACT
Geosocial applications collect (and record) users' precise location data to perform proximity computations, such as notifying a user or triggering a service when a friend is within geographic proximity. With the growing popularity of mobile devices that have sophisticated localization capability it becomes more convenient and tempting to share location data. But the precise location data in plaintext not only exposes user's whereabouts but also mobility patterns that are sensitive and cannot be changed easily. This paper proposes cryptographic protocols on top of spatial cloaking to reduce the resolution of location and balance between data utility and privacy. Specifically we interest in the setting that allows users to send periodic updates of precise coordinates and define privacy preferences to control the granularity of the location, both in an encrypted format. Our system supports three kinds of user queries --- "Where is this user?", "Who is nearby?", and "How close is this user from another user?". Also, we develop a new algorithm to improve the multidimensional data access by reducing significant masking error. Our prototype and various performance evaluations on different platforms demonstrated that our system is practical.
- Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan, and Daniel Wichs. 2012. Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. In EUROCRYPT. Springer-Verlag. Google ScholarDigital Library
- Omer Barak, Gabriella Cohen, and Eran Toch. 2016. Anonymizing mobility data using semantic cloaking. Pervasive and Mobile Computing, Special Issue on Security and Privacy in Mobile Clouds 28 (2016), 102--112. Google ScholarDigital Library
- A.R. Beresford and F. Stajano. 2003. Location Privacy in Pervasive Computing. Pervasive Computing, IEEE 2, 1 (Jan 2003), 46--55. Google ScholarDigital Library
- Claudio Bettini and Daniele Riboni. 2015. Privacy Protection in Pervasive Systems: State of the Art and Technical Challenges. Pervasive and Mobile Computing 17, Part B (2015), 159 -- 174. Google ScholarDigital Library
- Joppe W. Bos, Kristin Lauter, Jake Loftus, and Michael Naehrig. 2013. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme. In Cryptography and Coding. LNCS, Vol. 8308. Springer Berlin Heidelberg, 45--64. Google ScholarDigital Library
- Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2012. (Leveled) Fully Homomorphic Encryption without Bootstrapping. In Innovations in Theoretical Computer Science (ITCS). 309--325. Google ScholarDigital Library
- Zvika Brakerski and Vinod Vaikuntanathan. 2011. Efficient Fully Homomorphic Encryption from (Standard) LWE. In FOCS. IEEE Computer Society, 97--106. Google ScholarDigital Library
- Jung Hee Cheon, Miran Kim, and Kristin Lauter. 2015. Homomorphic Computation of Edit Distance. In Workshop on Encrypted Computing and Applied Homomorphic Cryptography (WAHC). ACM, Isla Verde, Puerto Rico.Google Scholar
- Sherman S. M. Chow, Jie-Han Lee, and Lakshminarayanan Subramanian. 2009. Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases. In Network and Distributed System Security Symposium (NDSS).Google Scholar
- Sunny Consolvo, Ian E. Smith, Tara Matthews, Anthony LaMarca, Jason Tabert, and Pauline Powledge. 2005. Location Disclosure to Social Relations: Why, when, & What People Want to Share. In Human Factors in Computing Systems (CHI). ACM, New York, NY, USA, 81--90. Google ScholarDigital Library
- Cynthia Dwork. 2006. Differential Privacy. In ICALP (LNCS), Vol. 4052. Springer Verlag, Venice, Italy, 1--12. Google ScholarDigital Library
- Taher El Gamal. 1985. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In CRYPTO. Springer-Verlag New York, Inc., Santa Barbara, California, USA, 10--18. Google ScholarDigital Library
- Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. (2012).Google Scholar
- Uriel Feige, Amos Fiat, and Adi Shamir. 1988. Zero-Knowledge Proofs of Identity. J. Cryptology 1, 2 (June 1988), 77--94. Google ScholarDigital Library
- Julien Freudiger, Maxim Raya, Márk Félegyházi, Panos Papadimitratos, and Jean-Pierre Hubaux. 2007. Mix-Zones for Location Privacy in Vehicular Networks. In Proceeding of Win-ITS'07. Vancouver, British Columbia.Google Scholar
- Volker Gaede and Oliver Günther. 1998. Multidimensional Access Methods. ACM Comput. Surv. 30, 2 (June 1998), 170--231. Google ScholarDigital Library
- B Gedik, Kun-Lung Wu, P S Yu, and Ling Liu. 2006. Processing Moving Queries over Moving Objects using Motion-adaptive Indexes. IEEE Transactions on Knowledge and Data Engineering 18, 5 (2006), 651--668. Google ScholarDigital Library
- Craig Gentry, Shai Halevi, and Nigel P. Smart. 2015. Homomorphic Evaluation of the AES Circuit (Updated Implementation). In Cryptography ePrint Archive. LNCS, Vol. 7417. Springer Berlin Heidelberg, 850--867. Last Updated on 2015. Originally appeared in CRYPTO 2012. Google ScholarDigital Library
- Shai Halevi and Victor Shoup. 2014. Algorithms in HElib. In CRYPTO. Springer, 554--571.Google Scholar
- Tanzima Hashem and Lars Kulik. 2011. "Don't trust anyone": Privacy Protection for Location-Based Services. Pervasive & Mobile Computing 7, 1 (2011), 44 -- 59. Google ScholarDigital Library
- Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski. 2016. Evaluation of Homomorphic Primitives for Computations on Encrypted Data for CPS systems. In IEEE CPS Week Smart City Security and Privacy Workshop (SCSP-W). Vienna, Austria.Google ScholarCross Ref
- Peizhao Hu, Tamalika Mukherjee, Alagu Valliappan, and Stanislaw Radziszowski. 2016. Homomorphic Proximity Computation in Geosocial Networks. In BigSecurity an INFOCOM workshop.Google Scholar
- Ali Khoshgozaran and Cyrus Shahabi. 2007. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In SSTD. Springer-Verlag, 239--257. Google ScholarDigital Library
- Ali Khoshgozaran and Cyrus Shahabi. 2009. Private Buddy Search: Enabling Private Spatial Queries in Social Networks. In Social Intelligence and Networking (SIN), Computational Sci and Engg. (CSE) - Vol. 04. IEEE Comp. Society, 166--173. Google ScholarDigital Library
- John Krumm. 2009. A Survey of Computational Location Privacy. Personal Ubiquitous Comput. 13, 6 (Aug. 2009), 391--399. Google ScholarDigital Library
- Tancrede Lepoint and Michael Naehrig. 2014. A Comparison of the Homomorphic Encryption Schemes FV and YASHE. In AfricaCrypt. Springer, 318--335.Google Scholar
- Vadim Lyubashevsky, Chris Peikert, and Oded Regev. 2013. On Ideal Lattices and Learning with Errors over Rings. J. ACM 60, 6, Article 43 (Nov. 2013), 35 pages. Google ScholarDigital Library
- Sergio Mascetti, Dario Freni, Claudio Bettini, X. Sean Wang, and Sushil Jajodia. 2011. Privacy in Geo-social Networks: Proximity Notification with Untrusted Service Providers and Curious Buddies. The VLDB Journal 20, 4 (2011), 541--566. Google ScholarDigital Library
- Michael Naehrig, Kristin Lauter, and Vinod Vaikuntanathan. 2011. Can Homomorphic Encryption be Practical?. In Cloud Comp. Sec. Ws. (CCSW). 113--124. Google ScholarDigital Library
- Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, and Dan Boneh. 2011. Location Privacy via Private Proximity Testing. In Network and Distributed System Security Symposium (NDSS).Google Scholar
- Janus Dam Nielsen, Jakob Illeborg, and Michael Bladt Stausholm. 2012. Location Privacy via Actively Secure Private Proximity Testing. In PerCom Workshop. Lugano, Switzerland, 381--386.Google ScholarCross Ref
- Alexandra-Mihaela Olteanu, Kévin Huguenin, Reza Shokri, and Jean-Pierre Hubaux. 2014. Quantifying the Effect of Co-location Information on Location Privacy. Privacy Enhancing Technologies 8555, Chapter 10 (2014), 184--203.Google ScholarCross Ref
- Femi Olumofin, Piotr K Tysowski, Ian Goldberg, and Urs Hengartner. 2010. Achieving Efficient Query Privacy for Location Based Services. In Privacy Enhancing Technologies Symposium (PETS). Springer-Verlag, 93--110. Google ScholarDigital Library
- Tao Peng, Qin Liu, and Guojun Wang. 2013. Privacy Preserving for Location-Based Services Using Location Transformation. CSS 8300, Chap. 2 (2013), 14--28.Google Scholar
- Krishna P. N. Puttaswamy, Shiyuan Wang, Troy Steinbauer, Divyakant Agrawal, Amr El Abbadi, Christopher Kruegel, and Ben Y. Zhao:. 2014. Preserving Location Privacy in Geosocial Applications. IEEE Trans. Mob. Comput. (2014), 159--173. Google ScholarDigital Library
- Gokay Saldamli, Richard Chow, Hongxia Jin, and Bart Knijnenburg. 2013. Private Proximity Testing with an Untrusted Server. In ACM WiSec. ACM, 113--118. Google ScholarDigital Library
- Joe Schwartz. 2012. Bing Maps Tile System. https://msdn.microsoft.com/en-us/library/bb259689.aspx. (2012).Google Scholar
- Carmen Ruiz Vicente, Dario Freni, Claudio Bettini, and Christian S. Jensen. 2011. Location-Related Privacy in Geo-Social Networks. IEEE Internet Computing 15, 3 (2011), 20--27. Google ScholarDigital Library
- Boyang Wang, Ming Li, Sherman S. M. Chow, and Hui Li. 2014. A tale of two clouds: Computing on data encrypted under multiple keys. In IEEE Communications and Network Security (CNS). 337--345.Google Scholar
- Tao Zhang, Sherman S. M. Chow, Zhe Zhou, and Ming Li. 2016. Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. In Advances in Information and Computer Security (IWSEC). 215--233.Google Scholar
- Ge Zhong, Ian Goldberg, and Urs Hengartner. 2007. Louis, Lester and Pierre - Three Protocols for Location Privacy. In Privacy Enhancing Technologies. 62--76. Google ScholarDigital Library
Recommendations
Privacy-preserving framework for geosocial applications
The paper deals with user privacy in geosocial applications. Geosocial applications have become very popular but can misuse user's private data and location. We propose a novel solution that prevents tracking and protects against personal identity and ...
Preserving Location Privacy in Geosocial Applications
Using geosocial applications, such as FourSquare, millions of people interact with their surroundings through their friends and their recommendations. Without adequate privacy protection, however, these systems can be easily misused, for example, to ...
Private geosocial networking
GIS '11: Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information SystemsLocation based social or geosocial networks (GSNs) have recently emerged as a natural combination of location based services with online social networks: users register their location and activities, share it with friends and achieve special status (...
Comments