Computer Science ›› 2015, Vol. 42 ›› Issue (4): 101-105.doi: 10.11896/j.issn.1002-137X.2015.04.019

Previous Articles     Next Articles

Privacy-preserving for Location-based Service over Encrypted Data Search

LIU Shu-bo, LI Yan-min and LIU Meng-jun   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In location-based service system,it is a vital problem to protect user’s privacy including identity privacy,location privacy and preference privacy, and gain high quality service for users at the same time.This paper proposed a privacy-preserving scheme based on encrypted data search.Location-based service provider outsources its encrypted data and index to cloud server who executes user’s LBS queries and returns the top-K results to user according to matching score.The scheme does not rely on user’s cooperation and any trusted third party.Finally theoretical and experimental analysis shows that the proposed scheme can effectively protect user’s identity,location and preference privacy with a lower computation and communication overhead.

Key words: Location-based service,Privacy-preserving,Searchable encryption,Matching score

[1] Leitner M,Curtis .A first step towards a framework for presenting the location of confidential point data on maps-results of an empirical perceptual study[J].International Journal of Geographical Information Science,2006,20(7):813-822
[2] Shankar P,Ganapathy V,Iftode L.Privately querying location-based services with Sybilquery[C]∥Proceedings of the 11th International Conference on Ubiquitous Computing (UbiComp,ACM).2009:31-40
[3] Chang Wei,Wu Jie,Tan Chiu-Chiang .Enhancing mobile social network privacy[C]∥Proceedings of the IEEE Global Communications Conference (Globecom).2011:1-5
[4] Wei Wei,Xu Feng-yuan,Li Qun.Flexible Privacy-preserving location sharing in mobile online social networks[C]∥Procee-dings of the 31st IEEE International Conference on Computer Communications (INFOCOM).2012:2616-2620
[5] Gedik B,Liu Ling.Location privacy in mobile systems:A per-sonalized anonymization model[C]∥Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS).2005:620-629
[6] Chow Chi-Yin,Mokbel M F,Walid G.The new Casper:Query processing for location services without compromising privacy[C]∥Proceedings of the 32nd International Conference on Ver Large Data Base.2006:763-774
[7] Chow Chi-Yin,Mokbel M F,He Tian.A privacy-preserving location monitoring system for wireless sensor networks[J].IEEE Transactions on Mobile Computing,2010:94-107
[8] Chow Chi-Yin,Mokbel M F,Leong V.On Efficient and Scalable Support of Continuous Queries in Mobile Peer-to-Peer Environments[J].IEEE Transactions on Mobile Computing,2011,10(10):1473-1487
[9] Beresford A R,Stajano F.Location privacy in pervasive computing[J].IEEE Pervasive Computing,2003,2(1):46-55
[10] Pfitzmann A,Kohntopp M.Anonymity,unobservability,andpseudonymity-a proposal for terminology[C]∥Designing privacy enhancing technologies.2001:1-9
[11] Dingledine R,Mathewson N,Syverson P.Tor:The second-generation onion router[C]∥Proceedings of the 13th USENIX Security Symposium (Security’04).2004:303-320
[12] Chow Chi-Yin,Mokbel M F,Liu Xuan.A peer-to-peer spatialcloaking algorithm for anonymous location-based services[C]∥Proc of the 14th ACM International Symposium on Advances in Geographic Information Systerms.NewYork:ACM Press,2006:171-178
[13] Mokbel M F,Chow Chi-Yin,Aref W G.The new casper:aprivacy-aware location-based database server.http://www-users.cs.umn.edu
[14] Ghinita G,Kalnis P,Skiadopoulos S.A mobile peer-to-peer system for anomymous location-based queries[C]∥Proc.of the 10th International Symposium on Advances in Spatial and Temporal Databases.Berlin:Springer-Verlag,2007:519-523
[15] Kalnis P,Ghinita G,Mouratidis K,et al.Preventing location- based identity inference in anonymous spatial queries[C]∥IEEE Trans.Knowl.Data Eng..2007:1719-1733
[16] Lu Rong-xing,Lin Xiao-dong,Shi Zhi-guo,et al.PLAM:A privacy-preserving framework for local-area mobile social networks[C]∥Proceedings of the 33st IEEE International Confe-rence on Computer Communications.2014
[17] Niu Ben,Li Qing-hua,Zhu Xiao-yan,et al.Achieving k-anonymity in Privacy-Aware Location-Based Services[C]∥Proceedings of the 33st IEEE International Conference on Computer Communications.2014
[18] Shao Jun,Lu Rong-xing,Lin Xiao-dong.FINE:A fine-grained privacy-preserving location-based service framework for mobile devices[C]∥Proceedings of the 33st IEEE International Conference on Computer Communications.2014
[19] Blaze M,Bleumer G,Strauss M.Divertible protocols and atomic proxy cryptography[C]∥Proceedings of Eurocrypt.1998,1403:127-144
[20] Wong W K,Cheung D W,Kao B.Secure knn computation on encrypted databases[C]∥Proceedings of the 35th SIGMOD International Conference on Management of Data.2009:139-152
[21] Cao N,Wang C,Li M,et al.Privacy-preserving Multi-keyword ranked search over encrypted cloud data[C]∥IEEE INFOCOM.2011:829-837

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!