skip to main content
research-article

Resilient Privacy Protection for Location-Based Services through Decentralization

Published:25 September 2019Publication History
Skip Abstract Section

Abstract

Location-Based Services (LBSs) provide valuable services, with convenient features for mobile users. However, the location and other information disclosed through each query to the LBS erodes user privacy. This is a concern especially because LBS providers can be honest-but-curious, collecting queries and tracking users’ whereabouts and infer sensitive user data. This motivated both centralized and decentralized location privacy protection schemes for LBSs: anonymizing and obfuscating LBS queries to not disclose exact information, while still getting useful responses. Decentralized schemes overcome disadvantages of centralized schemes, eliminating anonymizers, and enhancing users’ control over sensitive information. However, an insecure decentralized system could create serious risks beyond private information leakage. More so, attacking an improperly designed decentralized LBS privacy protection scheme could be an effective and low-cost step to breach user privacy. We address exactly this problem, by proposing security enhancements for mobile data sharing systems. We protect user privacy while preserving accountability of user activities, leveraging pseudonymous authentication with mainstream cryptography. We show our scheme can be deployed with off-the-shelf devices based on an experimental evaluation of an implementation in a static automotive testbed.

References

  1. Raed Al-Dhubhani and Jonathan Cazalas. 2017. Correlation analysis for geo-indistinguishability based continuous LBS queries. In International Conference on Anti-Cyber Crimes (ICACC). Abha, Saudi Arabia, 203--208.Google ScholarGoogle ScholarCross RefCross Ref
  2. Nikolaos Alexiou, Marcello Laganà, Stylianos Gisdakis, Mohammad Khodaei, and Panagiotis Papadimitratos. 2013. VeSPA: Vehicular security and privacy-preserving architecture. In ACM HotWiSec. Budapest, Hungary, 19--24.Google ScholarGoogle Scholar
  3. Miguel E. Andrés, Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2013. Geo-indistinguishability: Differential privacy for location-based systems. In ACM CCS. Berlin, Germany, 901--914.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Claudio Ardagna, Marco Cremonini, Ernesto Damiani, S. De Capitani di Vimercati, and Pierangela Samarati. 2007. Location privacy protection through obfuscation-based techniques. Data and Applications Security XXI, 47--60.Google ScholarGoogle Scholar
  5. Louise Barkhuus and Anind K. Dey. 2003. Location-based services for mobile telephony: A study of users’ privacy concerns. In INTERACT. Zurich, Switzerland, 702--712.Google ScholarGoogle Scholar
  6. Giorgio Calandriello, Panos Papadimitratos, J.-P. Hubaux, and Antonio Lioy. 2011. On the performance of secure vehicular communication systems. IEEE Transactions on Dependable and Secure Computing 8, 6 (2011), 898--912.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Daniel Camps-Mur, Andres Garcia-Saavedra, and Pablo Serrano. 2013. Device-to-device communications with Wi-Fi direct: Overview and experimentation. IEEE Wireless Communications 20, 3 (2013), 96--104.Google ScholarGoogle ScholarCross RefCross Ref
  8. Shin-Ming Cheng, Weng Chon Ao, Pin-Yu Chen, and Kwang-Cheng Chen. 2011. On modeling malware propagation in generalized social networks. IEEE Communications Letters 15, 1 (2011), 25--27.Google ScholarGoogle ScholarCross RefCross Ref
  9. Chi-Yin Chow, Mohamed F. Mokbel, and Xuan Liu. 2006. A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In ACM International Symposium on Advances in Geographic Information Systems. Arlington, VA, 171--178.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Chi-Yin Chow, Mohamed F. Mokbel, and Xuan Liu. 2011. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15, 2 (2011), 351--380.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Lara Codeca, Raphaël Frank, and Thomas Engel. 2015. Luxembourg SUMO traffic (LuST) scenario: 24 hours of mobility for vehicular networking research. In IEEE Vehicular Networking Conference. Paderborn, Germany, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  12. Rinku Dewri, Indrakshi Ray, Indrajit Ray, and Darrell Whitley. 2010. Query m-invariance: Preventing query disclosures in continuous location-based services. In Mobile Data Management (MDM) Conference. Kansas City, MO, 95--104.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Wisam Eltarjaman, Rinku Dewri, and Ramakrishna Thurimella. 2017. Private retrieval of POI details in top-K queries. IEEE Transactions on Mobile Computing 16, 9 (2017), 2611--2624.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. ETSI EN 302 637-2. 2014. Intelligent Transport Systems; Vehicular Communications; Basic Set of Applications; Part 2: Specification of Cooperative Awareness Basic Service.Google ScholarGoogle Scholar
  15. Joshua Fogel and Elham Nehmad. 2009. Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior 25, 1 (2009), 153--160.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Bugra Gedik and Ling Liu. 2008. Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transaction on Mobile Computing 7, 1 (2008), 1--18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Meysam Ghaffari, Nasser Ghadiri, Mohammad Hossein Manshaei, and Mehran Sadeghi Lahijani. 2017. : A peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Transactions on Vehicular Technology 66, 10 (2017), 9458--9469.Google ScholarGoogle ScholarCross RefCross Ref
  18. Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, and Kian-Lee Tan. 2008. Private queries in location based services: Anonymizers are not necessary. In ACM SIGMOD. Vancouver, Canada, 121--132.Google ScholarGoogle Scholar
  19. Gabriel Ghinita, Panos Kalnis, and Spiros Skiadopoulos. 2007. MOBIHIDE: A mobile peer-to-peer system for anonymous location-based queries. In Advances in Spatial and Temporal Databases. Boston, MA, USA, 221--238.Google ScholarGoogle Scholar
  20. Stylianos Gisdakis, Thanassis Giannetsos, and Panos Papadimitratos. 2014. SPPEAR: Security 8 privacy-preserving architecture for participatory-sensing applications. In ACM WiSec. Oxford, UK, 39--50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Stylianos Gisdakis, Thanassis Giannetsos, and Panos Papadimitratos. 2015. SHIELD: A data verification framework for participatory sensing systems. In ACM WiSec. New York.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Stylianos Gisdakis, Marcello Laganà, Thanassis Giannetsos, and Panos Papadimitratos. 2013. SEROSA: SERvice oriented security architecture for vehicular communications. In IEEE Vehicular Networking Conference. Boston, MA, 111--118.Google ScholarGoogle ScholarCross RefCross Ref
  23. Aris Gkoulalas-Divanis, Panos Kalnis, and Vassilios S. Verykios. 2010. Providing k-anonymity in location based services. ACM SIGKDD Explorations Newsletter 12, 1 (2010), 3--10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Philippe Golle and Kurt Partridge. 2009. On the anonymity of home/work location pairs. In PerCom. Nara, Japan, 390--397.Google ScholarGoogle Scholar
  25. Carles Gomez, Joaquim Oller, and Josep Paradells. 2012. Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology. Sensors 12, 9 (2012), 11734--11753.Google ScholarGoogle ScholarCross RefCross Ref
  26. Marco Gruteser and Dirk Grunwald. 2003. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys. San Francisco, CA, 31--42.Google ScholarGoogle Scholar
  27. Tanzima Hashem and Lars Kulik. 2007. Safeguarding location privacy in wireless ad-hoc networks. In International Conference on Ubiquitous Computing. Innsbruck, Austria, 372--390.Google ScholarGoogle ScholarCross RefCross Ref
  28. Baik Hoh and Marco Gruteser. 2005. Protecting location privacy through path confusion. In International Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece, 194--205.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Haibo Hu and Jianliang Xu. 2009. Non-exposure location anonymity. In ICDE. Shanghai, China, 1120--1131.Google ScholarGoogle Scholar
  30. Qin Hu, Shengling Wang, Chunqiang Hu, Jianhui Huang, Wei Li, and Xiuzhen Cheng. 2018. Messages in a concealed bottle: Achieving query content privacy with accurate location-based services. IEEE Transactions on Vehicular Technology 67, 8 (2018), 7698--7711.Google ScholarGoogle ScholarCross RefCross Ref
  31. Hongyu Jin and Panos Papadimitratos. 2015. Resilient collaborative privacy for location-based services. In Nordic Conference on Secure IT Systems. Stockholm, Sweden, 47--63.Google ScholarGoogle ScholarCross RefCross Ref
  32. M. Eric Johnson, Dan McGuire, and Nicholas D. Willey. 2008. The evolution of the peer-to-peer file sharing industry and the security risks for users. In Hawaii International Conference on System Sciences. Waikoloa, HI, 1--10.Google ScholarGoogle Scholar
  33. Panos Kalnis, Gabriel Ghinita, Kyriakos Mouratidis, and Dimitris Papadias. 2007. Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering 19, 12 (2007), 1719--1733.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Mohammad Khodaei, Hongyu Jin, and Panos Papadimitratos. 2014. Towards deploying a scalable 8 robust vehicular identity and credential management infrastructure. In IEEE Vehicular Networking Conference. Paderborn, Germany, 33--40.Google ScholarGoogle ScholarCross RefCross Ref
  35. M. Khodaei, H. Jin, and P. Papadimitratos. 2018. SECMACE: Scalable and robust identity and credential management infrastructure in vehicular communication systems. IEEE Transactions on ITS 19, 5 (May 2018), 1430--1444.Google ScholarGoogle Scholar
  36. Mohammad Khodaei and Panos Papadimitratos. 2018. Efficient, scalable, and resilient vehicle-centric certificate revocation list distribution in VANETs. In ACM WiSec. Stockholm, Sweden, 172--183.Google ScholarGoogle Scholar
  37. Hidetoshi Kido, Yutaka Yanagisawa, and Tetsuji Satoh. 2005. An anonymous communication technique using dummies for location-based services. In International Conference on Pervasive Services. Santorini, Greece, 88--97.Google ScholarGoogle ScholarCross RefCross Ref
  38. Daniel Krajzewicz, Jakob Erdmann, Michael Behrisch, and Laura Bieker. 2012. Recent development and applications of SUMO - Simulation of Urban MObility. International Journal On Advances in Systems and Measurements 5, 384 (2012), 128--138.Google ScholarGoogle Scholar
  39. Wei-Shinn Ku and Roger Zimmermann. 2008. Nearest neighbor queries with peer-to-peer data sharing in mobile environments. Pervasive and Mobile Computing 4, 5 (2008), 775--788.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Sai Ho Kwok, Karl R Lang, and Kar Yan Tam. 2002. Peer-to-peer technology business and service models: Risks and opportunities. Electronic Markets (2002).Google ScholarGoogle Scholar
  41. Xingqin Lin, Jeffrey Andrews, Amitabha Ghosh, and Rapeepat Ratasuk. 2014. An overview of 3GPP device-to-device proximity services. IEEE Communications Magazine 52, 4 (2014), 40--48.Google ScholarGoogle ScholarCross RefCross Ref
  42. Bo Liu, Wanlei Zhou, Tianqing Zhu, Longxiang Gao, Tom H. Luan, and Haibo Zhou. 2016. Silence is golden: Enhancing privacy of location-based services by content broadcasting and active caching in wireless vehicular networks. IEEE Transactions on Vehicular Technology 65, 12 (2016), 9942--9953.Google ScholarGoogle ScholarCross RefCross Ref
  43. Fuyu Liu, Kien A Hua, and Ying Cai. 2009. Query l-diversity in location-based services. In International Conference on Mobile Data Management: Systems, Services and Middleware. Taipei, Taiwan, 436--442.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Mehnaz Tabassum Mahin, Tanzima Hashem, and Samia Kabir. 2017. A crowd enabled approach for processing nearest neighbor and range queries in incomplete databases with accuracy guarantee. Pervasive and Mobile Computing 39 (2017), 249--266.Google ScholarGoogle ScholarCross RefCross Ref
  45. Sergio Mascetti, Claudio Bettini, Dario Freni, and X. Sean Wang. 2007. Spatial generalisation algorithms for LBS privacy preservation. Journal of Location Based Services 1, 3 (2007), 179--207.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Mohamed F. Mokbel, Chi-Yin Chow, and Walid G. Aref. 2006. The new Casper: Query processing for location services without compromising privacy. In Very Large Data Bases Conference. Seoul, South Korea, 763--774.Google ScholarGoogle Scholar
  47. H. H. Nguyen and H. Y. Jeong. 2018. Mobility-adaptive beacon broadcast for vehicular cooperative safety-critical applications. IEEE Transactions on Intelligent Transportation Systems 19, 6 (June 2018), 1996--2010.Google ScholarGoogle ScholarCross RefCross Ref
  48. Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, and Hui Li. 2015. Enhancing privacy through caching in location-based services. In 2015 IEEE INFOCOM. Kowloon, Hong Kong, 1017--1025.Google ScholarGoogle Scholar
  49. Femi Olumofin, Piotr K. Tysowski, Ian Goldberg, and Urs Hengartner. 2010. Achieving efficient query privacy for location based services. In International Symposium on Privacy Enhancing Technologies. Berlin, Germany, 93--110.Google ScholarGoogle ScholarCross RefCross Ref
  50. Panagiotis Papadimitratos, Levente Buttyan, Tamás Holczer, Elmar Schoch, Julien Freudiger, Maxim Raya, Zhendong Ma, Frank Kargl, Antonio Kung, and J.-P. Hubaux. 2008. Secure vehicular communication systems: Design and architecture. IEEE Comm. Mag. 46, 11 (2008), 100--109.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Aniket Pingley, Nan Zhang, Xinwen Fu, Hyeong-Ah Choi, Suresh Subramaniam, and Wei Zhao. 2011. Protection of query privacy for continuous location based services. In IEEE INFOCOM. Shanghai, China, 1710--1718.Google ScholarGoogle Scholar
  52. Krishna Ramachandran and Biplab Sikdar. 2006. Modeling malware propagation in gnutella type peer-to-peer networks. In IEEE International Parallel and Distributed Processing Symposium. Vancouver, Canada.Google ScholarGoogle ScholarCross RefCross Ref
  53. Krishna Sampigethaya, Mingyan Li, Leping Huang, and Radha Poovendran. 2007. AMOEBA: Robust location privacy scheme for VANET. IEEE Journal on Selected Areas in Communications 25, 8 (2007).Google ScholarGoogle ScholarCross RefCross Ref
  54. R. K. Schmidt, T. Leinmuller, E. Schoch, F. Kargl, and G. Schafer. 2010. Exploration of adaptive beaconing for efficient intervehicle safety communication. IEEE Network 24, 1 (Jan 2010), 14--19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, and Jean-Pierre Hubaux. 2014. Hiding in the mobile crowd: Locationprivacy through collaboration. IEEE Transactions on Dependable and Secure Computing 11, 3 (2014), 266--279.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Reza Shokri, Carmela Troncoso, Claudia Diaz, Julien Freudiger, and Jean-Pierre Hubaux. 2010. Unraveling an old cloak: k-anonymity for location privacy. In ACM WPES. Chicago, IL, 115--118.Google ScholarGoogle Scholar
  57. Christoph Sommer, Reinhard German, and Falko Dressler. 2011. Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Transaction on Mobile Computing 10, 1 (2011), 3--15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Christoph Sommer, Ozan K. Tonguz, and Falko Dressler. 2011. Traffic information systems: Efficient message dissemination via adaptive beaconing. IEEE Communications Magazine 49, 5 (May 2011), 173--179.Google ScholarGoogle ScholarCross RefCross Ref
  59. Mohsen Nader Tehrani, Murat Uysal, and Halim Yanikomeroglu. 2014. Device-to-device communication in 5G cellular networks: Challenges, solutions, and future directions. IEEE Communications Magazine 52, 5 (2014), 86--92.Google ScholarGoogle ScholarCross RefCross Ref
  60. Sandesh Uppoor, Oscar Trullols-Cruces, Marco Fiore, and Jose M. Barcelo-Ordinas. 2014. Generation and analysis of a large-scale urban vehicular mobility dataset. IEEE Transactions on Mobile Computing 13, 5 (2014), 1061--1075.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Xun Yi, Russell Paulet, Elisa Bertino, Vijay Varadharajan, et al. 2016. Practical approximate k nearest neighbor queries with location and query privacy. IEEE Transactions on Knowledge and Data Engineering 28, 6 (2016), 1546--1559.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Haejung Yun, Dongho Han, and Choong C. Lee. 2013. Understanding the use of location-based service applications: Do privacy concerns matter? Journal of Electronic Commerce Research 14, 3 (2013), 215.Google ScholarGoogle Scholar
  63. Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, and Steve Chien. 2005. A first look at peer-to-peer worms: Threats and defenses. In International Workshop on Peer-to-Peer Systems. Ithaca, NY, 24--35.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Resilient Privacy Protection for Location-Based Services through Decentralization

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Privacy and Security
          ACM Transactions on Privacy and Security  Volume 22, Issue 4
          November 2019
          170 pages
          ISSN:2471-2566
          EISSN:2471-2574
          DOI:10.1145/3364835
          Issue’s Table of Contents

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 September 2019
          • Accepted: 1 March 2019
          • Revised: 1 November 2018
          • Received: 1 October 2017
          Published in tops Volume 22, Issue 4

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format