Abstract
Location-Based Services (LBSs) provide valuable services, with convenient features for mobile users. However, the location and other information disclosed through each query to the LBS erodes user privacy. This is a concern especially because LBS providers can be honest-but-curious, collecting queries and tracking users’ whereabouts and infer sensitive user data. This motivated both centralized and decentralized location privacy protection schemes for LBSs: anonymizing and obfuscating LBS queries to not disclose exact information, while still getting useful responses. Decentralized schemes overcome disadvantages of centralized schemes, eliminating anonymizers, and enhancing users’ control over sensitive information. However, an insecure decentralized system could create serious risks beyond private information leakage. More so, attacking an improperly designed decentralized LBS privacy protection scheme could be an effective and low-cost step to breach user privacy. We address exactly this problem, by proposing security enhancements for mobile data sharing systems. We protect user privacy while preserving accountability of user activities, leveraging pseudonymous authentication with mainstream cryptography. We show our scheme can be deployed with off-the-shelf devices based on an experimental evaluation of an implementation in a static automotive testbed.
- Raed Al-Dhubhani and Jonathan Cazalas. 2017. Correlation analysis for geo-indistinguishability based continuous LBS queries. In International Conference on Anti-Cyber Crimes (ICACC). Abha, Saudi Arabia, 203--208.Google ScholarCross Ref
- Nikolaos Alexiou, Marcello Laganà, Stylianos Gisdakis, Mohammad Khodaei, and Panagiotis Papadimitratos. 2013. VeSPA: Vehicular security and privacy-preserving architecture. In ACM HotWiSec. Budapest, Hungary, 19--24.Google Scholar
- Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2013. Geo-indistinguishability: Differential privacy for location-based systems. In ACM CCS. Berlin, Germany, 901--914.Google ScholarDigital Library
- Claudio Ardagna, Marco Cremonini, Ernesto Damiani, S. De Capitani di Vimercati, and Pierangela Samarati. 2007. Location privacy protection through obfuscation-based techniques. Data and Applications Security XXI, 47--60.Google Scholar
- Louise Barkhuus and Anind K. Dey. 2003. Location-based services for mobile telephony: A study of users’ privacy concerns. In INTERACT. Zurich, Switzerland, 702--712.Google Scholar
- Giorgio Calandriello, Panos Papadimitratos, J.-P. Hubaux, and Antonio Lioy. 2011. On the performance of secure vehicular communication systems. IEEE Transactions on Dependable and Secure Computing 8, 6 (2011), 898--912.Google ScholarDigital Library
- Daniel Camps-Mur, Andres Garcia-Saavedra, and Pablo Serrano. 2013. Device-to-device communications with Wi-Fi direct: Overview and experimentation. IEEE Wireless Communications 20, 3 (2013), 96--104.Google ScholarCross Ref
- Shin-Ming Cheng, Weng Chon Ao, Pin-Yu Chen, and Kwang-Cheng Chen. 2011. On modeling malware propagation in generalized social networks. IEEE Communications Letters 15, 1 (2011), 25--27.Google ScholarCross Ref
- Chi-Yin Chow, Mohamed F. Mokbel, and Xuan Liu. 2006. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In ACM International Symposium on Advances in Geographic Information Systems. Arlington, VA, 171--178.Google ScholarDigital Library
- Chi-Yin Chow, Mohamed F. Mokbel, and Xuan Liu. 2011. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15, 2 (2011), 351--380.Google ScholarDigital Library
- Lara Codeca, Raphaël Frank, and Thomas Engel. 2015. Luxembourg SUMO traffic (LuST) scenario: 24 hours of mobility for vehicular networking research. In IEEE Vehicular Networking Conference. Paderborn, Germany, 1--8.Google ScholarCross Ref
- Rinku Dewri, Indrakshi Ray, Indrajit Ray, and Darrell Whitley. 2010. Query m-invariance: Preventing query disclosures in continuous location-based services. In Mobile Data Management (MDM) Conference. Kansas City, MO, 95--104.Google ScholarDigital Library
- Wisam Eltarjaman, Rinku Dewri, and Ramakrishna Thurimella. 2017. Private retrieval of POI details in top-K queries. IEEE Transactions on Mobile Computing 16, 9 (2017), 2611--2624.Google ScholarDigital Library
- ETSI EN 302 637-2. 2014. Intelligent Transport Systems; Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service.Google Scholar
- Joshua Fogel and Elham Nehmad. 2009. Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior 25, 1 (2009), 153--160.Google ScholarDigital Library
- Bugra Gedik and Ling Liu. 2008. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transaction on Mobile Computing 7, 1 (2008), 1--18.Google ScholarDigital Library
- Meysam Ghaffari, Nasser Ghadiri, Mohammad Hossein Manshaei, and Mehran Sadeghi Lahijani. 2017. : A peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Transactions on Vehicular Technology 66, 10 (2017), 9458--9469.Google ScholarCross Ref
- Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, and Kian-Lee Tan. 2008. Private queries in location based services: Anonymizers are not necessary. In ACM SIGMOD. Vancouver, Canada, 121--132.Google Scholar
- Gabriel Ghinita, Panos Kalnis, and Spiros Skiadopoulos. 2007. MOBIHIDE: A mobile peer-to-peer system for anonymous location-based queries. In Advances in Spatial and Temporal Databases. Boston, MA, USA, 221--238.Google Scholar
- Stylianos Gisdakis, Thanassis Giannetsos, and Panos Papadimitratos. 2014. SPPEAR: Security 8 privacy-preserving architecture for participatory-sensing applications. In ACM WiSec. Oxford, UK, 39--50.Google ScholarDigital Library
- Stylianos Gisdakis, Thanassis Giannetsos, and Panos Papadimitratos. 2015. SHIELD: A data verification framework for participatory sensing systems. In ACM WiSec. New York.Google ScholarDigital Library
- Stylianos Gisdakis, Marcello Laganà, Thanassis Giannetsos, and Panos Papadimitratos. 2013. SEROSA: SERvice oriented security architecture for vehicular communications. In IEEE Vehicular Networking Conference. Boston, MA, 111--118.Google ScholarCross Ref
- Aris Gkoulalas-Divanis, Panos Kalnis, and Vassilios S. Verykios. 2010. Providing k-anonymity in location based services. ACM SIGKDD Explorations Newsletter 12, 1 (2010), 3--10.Google ScholarDigital Library
- Philippe Golle and Kurt Partridge. 2009. On the anonymity of home/work location pairs. In PerCom. Nara, Japan, 390--397.Google Scholar
- Carles Gomez, Joaquim Oller, and Josep Paradells. 2012. Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology. Sensors 12, 9 (2012), 11734--11753.Google ScholarCross Ref
- Marco Gruteser and Dirk Grunwald. 2003. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys. San Francisco, CA, 31--42.Google Scholar
- Tanzima Hashem and Lars Kulik. 2007. Safeguarding location privacy in wireless ad-hoc networks. In International Conference on Ubiquitous Computing. Innsbruck, Austria, 372--390.Google ScholarCross Ref
- Baik Hoh and Marco Gruteser. 2005. Protecting location privacy through path confusion. In International Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece, 194--205.Google ScholarDigital Library
- Haibo Hu and Jianliang Xu. 2009. Non-exposure location anonymity. In ICDE. Shanghai, China, 1120--1131.Google Scholar
- Qin Hu, Shengling Wang, Chunqiang Hu, Jianhui Huang, Wei Li, and Xiuzhen Cheng. 2018. Messages in a concealed bottle: Achieving query content privacy with accurate location-based services. IEEE Transactions on Vehicular Technology 67, 8 (2018), 7698--7711.Google ScholarCross Ref
- Hongyu Jin and Panos Papadimitratos. 2015. Resilient collaborative privacy for location-based services. In Nordic Conference on Secure IT Systems. Stockholm, Sweden, 47--63.Google ScholarCross Ref
- M. Eric Johnson, Dan McGuire, and Nicholas D. Willey. 2008. The evolution of the peer-to-peer file sharing industry and the security risks for users. In Hawaii International Conference on System Sciences. Waikoloa, HI, 1--10.Google Scholar
- Panos Kalnis, Gabriel Ghinita, Kyriakos Mouratidis, and Dimitris Papadias. 2007. Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering 19, 12 (2007), 1719--1733.Google ScholarDigital Library
- Mohammad Khodaei, Hongyu Jin, and Panos Papadimitratos. 2014. Towards deploying a scalable 8 robust vehicular identity and credential management infrastructure. In IEEE Vehicular Networking Conference. Paderborn, Germany, 33--40.Google ScholarCross Ref
- M. Khodaei, H. Jin, and P. Papadimitratos. 2018. SECMACE: Scalable and robust identity and credential management infrastructure in vehicular communication systems. IEEE Transactions on ITS 19, 5 (May 2018), 1430--1444.Google Scholar
- Mohammad Khodaei and Panos Papadimitratos. 2018. Efficient, scalable, and resilient vehicle-centric certificate revocation list distribution in VANETs. In ACM WiSec. Stockholm, Sweden, 172--183.Google Scholar
- Hidetoshi Kido, Yutaka Yanagisawa, and Tetsuji Satoh. 2005. An anonymous communication technique using dummies for location-based services. In International Conference on Pervasive Services. Santorini, Greece, 88--97.Google ScholarCross Ref
- Daniel Krajzewicz, Jakob Erdmann, Michael Behrisch, and Laura Bieker. 2012. Recent development and applications of SUMO - Simulation of Urban MObility. International Journal On Advances in Systems and Measurements 5, 384 (2012), 128--138.Google Scholar
- Wei-Shinn Ku and Roger Zimmermann. 2008. Nearest neighbor queries with peer-to-peer data sharing in mobile environments. Pervasive and Mobile Computing 4, 5 (2008), 775--788.Google ScholarDigital Library
- Sai Ho Kwok, Karl R Lang, and Kar Yan Tam. 2002. Peer-to-peer technology business and service models: Risks and opportunities. Electronic Markets (2002).Google Scholar
- Xingqin Lin, Jeffrey Andrews, Amitabha Ghosh, and Rapeepat Ratasuk. 2014. An overview of 3GPP device-to-device proximity services. IEEE Communications Magazine 52, 4 (2014), 40--48.Google ScholarCross Ref
- Bo Liu, Wanlei Zhou, Tianqing Zhu, Longxiang Gao, Tom H. Luan, and Haibo Zhou. 2016. Silence is golden: Enhancing privacy of location-based services by content broadcasting and active caching in wireless vehicular networks. IEEE Transactions on Vehicular Technology 65, 12 (2016), 9942--9953.Google ScholarCross Ref
- Fuyu Liu, Kien A Hua, and Ying Cai. 2009. Query l-diversity in location-based services. In International Conference on Mobile Data Management: Systems, Services and Middleware. Taipei, Taiwan, 436--442.Google ScholarDigital Library
- Mehnaz Tabassum Mahin, Tanzima Hashem, and Samia Kabir. 2017. A crowd enabled approach for processing nearest neighbor and range queries in incomplete databases with accuracy guarantee. Pervasive and Mobile Computing 39 (2017), 249--266.Google ScholarCross Ref
- Sergio Mascetti, Claudio Bettini, Dario Freni, and X. Sean Wang. 2007. Spatial generalisation algorithms for LBS privacy preservation. Journal of Location Based Services 1, 3 (2007), 179--207.Google ScholarDigital Library
- Mohamed F. Mokbel, Chi-Yin Chow, and Walid G. Aref. 2006. The new Casper: Query processing for location services without compromising privacy. In Very Large Data Bases Conference. Seoul, South Korea, 763--774.Google Scholar
- H. H. Nguyen and H. Y. Jeong. 2018. Mobility-adaptive beacon broadcast for vehicular cooperative safety-critical applications. IEEE Transactions on Intelligent Transportation Systems 19, 6 (June 2018), 1996--2010.Google ScholarCross Ref
- Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, and Hui Li. 2015. Enhancing privacy through caching in location-based services. In 2015 IEEE INFOCOM. Kowloon, Hong Kong, 1017--1025.Google Scholar
- Femi Olumofin, Piotr K. Tysowski, Ian Goldberg, and Urs Hengartner. 2010. Achieving efficient query privacy for location based services. In International Symposium on Privacy Enhancing Technologies. Berlin, Germany, 93--110.Google ScholarCross Ref
- Panagiotis Papadimitratos, Levente Buttyan, Tamás Holczer, Elmar Schoch, Julien Freudiger, Maxim Raya, Zhendong Ma, Frank Kargl, Antonio Kung, and J.-P. Hubaux. 2008. Secure vehicular communication systems: Design and architecture. IEEE Comm. Mag. 46, 11 (2008), 100--109.Google ScholarDigital Library
- Aniket Pingley, Nan Zhang, Xinwen Fu, Hyeong-Ah Choi, Suresh Subramaniam, and Wei Zhao. 2011. Protection of query privacy for continuous location based services. In IEEE INFOCOM. Shanghai, China, 1710--1718.Google Scholar
- Krishna Ramachandran and Biplab Sikdar. 2006. Modeling malware propagation in gnutella type peer-to-peer networks. In IEEE International Parallel and Distributed Processing Symposium. Vancouver, Canada.Google ScholarCross Ref
- Krishna Sampigethaya, Mingyan Li, Leping Huang, and Radha Poovendran. 2007. AMOEBA: Robust location privacy scheme for VANET. IEEE Journal on Selected Areas in Communications 25, 8 (2007).Google ScholarCross Ref
- R. K. Schmidt, T. Leinmuller, E. Schoch, F. Kargl, and G. Schafer. 2010. Exploration of adaptive beaconing for efficient intervehicle safety communication. IEEE Network 24, 1 (Jan 2010), 14--19.Google ScholarDigital Library
- Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, and Jean-Pierre Hubaux. 2014. Hiding in the mobile crowd: Locationprivacy through collaboration. IEEE Transactions on Dependable and Secure Computing 11, 3 (2014), 266--279.Google ScholarDigital Library
- Reza Shokri, Carmela Troncoso, Claudia Diaz, Julien Freudiger, and Jean-Pierre Hubaux. 2010. Unraveling an old cloak: k-anonymity for location privacy. In ACM WPES. Chicago, IL, 115--118.Google Scholar
- Christoph Sommer, Reinhard German, and Falko Dressler. 2011. Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Transaction on Mobile Computing 10, 1 (2011), 3--15.Google ScholarDigital Library
- Christoph Sommer, Ozan K. Tonguz, and Falko Dressler. 2011. Traffic information systems: Efficient message dissemination via adaptive beaconing. IEEE Communications Magazine 49, 5 (May 2011), 173--179.Google ScholarCross Ref
- Mohsen Nader Tehrani, Murat Uysal, and Halim Yanikomeroglu. 2014. Device-to-device communication in 5G cellular networks: Challenges, solutions, and future directions. IEEE Communications Magazine 52, 5 (2014), 86--92.Google ScholarCross Ref
- Sandesh Uppoor, Oscar Trullols-Cruces, Marco Fiore, and Jose M. Barcelo-Ordinas. 2014. Generation and analysis of a large-scale urban vehicular mobility dataset. IEEE Transactions on Mobile Computing 13, 5 (2014), 1061--1075.Google ScholarDigital Library
- Xun Yi, Russell Paulet, Elisa Bertino, Vijay Varadharajan, et al. 2016. Practical approximate k nearest neighbor queries with location and query privacy. IEEE Transactions on Knowledge and Data Engineering 28, 6 (2016), 1546--1559.Google ScholarDigital Library
- Haejung Yun, Dongho Han, and Choong C. Lee. 2013. Understanding the use of location-based service applications: Do privacy concerns matter? Journal of Electronic Commerce Research 14, 3 (2013), 215.Google Scholar
- Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, and Steve Chien. 2005. A first look at peer-to-peer worms: Threats and defenses. In International Workshop on Peer-to-Peer Systems. Ithaca, NY, 24--35.Google ScholarDigital Library
Index Terms
- Resilient Privacy Protection for Location-Based Services through Decentralization
Recommendations
Feeling-based location privacy protection for location-based services
CCS '09: Proceedings of the 16th ACM conference on Computer and communications securityAnonymous location information may be correlated with restricted spaces such as home and office for subject re-identification. This makes it a great challenge to provide location privacy protection for users of location-based services. Existing work ...
A novel privacy protection scheme for location-based services using collaborative caching
AbstractProtecting privacy in Location-based services (LBSs) has been one of the major concerns over the last few years. Users’ queries can reveal sensitive information to LBSs, thus giving an opportunity for the adversaries to track the ...
Privacy Preserving Scheme for Location and Content Protection in Location-Based Services
Security, Privacy, and Anonymity in Computation, Communication, and StorageAbstractLocation-Based Services (LBSs) have been facilitating and enriching people’s daily lives. While users enjoy plenty of conveniences, privacy disclosure in terms of both location information and query contents is common. Most of the existing ...
Comments