Skip to main content

A Hybrid Technique for Private Location-Based Queries with Database Protection

  • Conference paper
Advances in Spatial and Temporal Databases (SSTD 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5644))

Included in the following conference series:

Abstract

Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. To protect user privacy, it is important not to disclose exact user coordinates to un-trusted entities that provide location-based services. Currently, there are two main approaches to protect the location privacy of users: (i) hiding locations inside cloaking regions (CRs) and (ii) encrypting location data using private information retrieval (PIR) protocols. Previous work focused on finding good trade-offs between privacy and performance of user protection techniques, but disregarded the important issue of protecting the POI dataset D. For instance, location cloaking requires large-sized CRs, leading to excessive disclosure of POIs (O(|D|) in the worst case). PIR, on the other hand, reduces this bound to \(O(\sqrt{|D|})\), but at the expense of high processing and communication overhead.

We propose a hybrid, two-step approach to private location-based queries, which provides protection for both the users and the database. In the first step, user locations are generalized to coarse-grained CRs which provide strong privacy. Next, a PIR protocol is applied with respect to the obtained query CR. To protect excessive disclosure of POI locations, we devise a cryptographic protocol that privately evaluates whether a point is enclosed inside a rectangular region. We also introduce an algorithm to efficiently support PIR on dynamic POI sub-sets. Our method discloses O(1) POI, orders of magnitude fewer than CR- or PIR-based techniques. Experimental results show that the hybrid approach is scalable in practice, and clearly outperforms the pure-PIR approach in terms of computational and communication overhead.

The work reported in this paper has been partially supported by NSF grant 0712846 “IPS: Security Services for Healthcare Applications”, and MURI award FA9550-08-1-0265 from the Air Force Office of Scientific Research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gruteser, M., Grunwald, D.: Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In: Proc. of USENIX MobiSys. (2003)

    Google Scholar 

  2. Gedik, B., Liu, L.: Location Privacy in Mobile Systems: A Personalized Anonymization Model. In: Proc. of ICDCS, pp. 620–629 (2005)

    Google Scholar 

  3. Mokbel, M.F., Chow, C.Y., Aref, W.G.: The New Casper: Query Processing for Location Services without Compromising Privacy. In: Proc. of VLDB (2006)

    Google Scholar 

  4. Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preserving Location-based Identity Inference in Anonymous Spatial Queries. IEEE TKDE 19(12) (2007)

    Google Scholar 

  5. Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private Queries in Location Based Services: Anonymizers are not Necessary. In: SIGMOD (2008)

    Google Scholar 

  6. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: International Conference on Pervasive Services (ICPS), pp. 88–97 (2005)

    Google Scholar 

  7. Yiu, M.L., Jensen, C., Huang, X., Lu, H.: SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services. In: International Conference on Data Engineering (ICDE), pp. 366–375 (2008)

    Google Scholar 

  8. Cheng, R., Zhang, Y., Bertino, E., Prahbakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 393–412. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Chow, C.Y., Mokbel, M.F.: Enabling Private Continuous Queries for Revealed User Locations. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 258–275. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Gruteser, M., Liu, X.: Protecting Privacy in Continuous Location-Tracking Applications. IEEE Security and Privacy 2, 28–34 (2004)

    Article  Google Scholar 

  11. Damiani, M., Bertino, E., Silvestri, C.: PROBE: an Obfuscation System for the Protection of Sensitive Location Information in LBS. Technical Report 2001-145, CERIAS (2008)

    Google Scholar 

  12. Khoshgozaran, A., Shahabi, C.: Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 239–257. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: IEEE Symposium on Foundations of Computer Science (1995)

    Google Scholar 

  14. Kushilevitz, E., Ostrovsky, R.: Replication is NOT Needed: SINGLE Database, Computationally-Private Information Retrieval. In: FOCS (1997)

    Google Scholar 

  15. Flath, D.E.: Introduction to Number Theory. John Wiley & Sons, Chichester (1988)

    MATH  Google Scholar 

  16. Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165–179. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  17. Luo, Y., Huang, L., Zhong, H.: Secure two-party point-circle inclusion problem. J. of Computer Science and Technology 22(1), 88–91 (2007)

    Article  Google Scholar 

  18. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of ACM Symposium on Theory of Computing (STOC), pp. 218–229 (1987)

    Google Scholar 

  19. Chow, C.Y., Mokbel, M.F., Liu, X.: A Peer-to-peer Spatial Cloaking Algorithm for Anonymous Location-based Service. In: GIS, pp. 171–178 (2006)

    Google Scholar 

  20. Ghinita, G., Kalnis, P., Skiadopoulos, S.: PRIVE: Anonymous Location-based Queries in Distributed Mobile Systems. In: WWW (2007)

    Google Scholar 

  21. Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: A Mobile Peer-to-peer System for Anonymous Location-based Queries. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 221–238. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  22. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  23. Atallah, M.J.: Algorithms and Theory of Computation Handbook. CRC Press, Boca Raton (1998)

    Book  MATH  Google Scholar 

  24. de Berg, M., van Kreveld, M., Overmars, M., Schwarzkopf, O.: Computational Geometry: Algorithms and Applications, 2nd edn. Springer, Heidelberg (2000)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ghinita, G., Kalnis, P., Kantarcioglu, M., Bertino, E. (2009). A Hybrid Technique for Private Location-Based Queries with Database Protection. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds) Advances in Spatial and Temporal Databases. SSTD 2009. Lecture Notes in Computer Science, vol 5644. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02982-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02982-0_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02981-3

  • Online ISBN: 978-3-642-02982-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics