Skip to main content
Log in

EP2LBS: efficient privacy-preserving scheme for location-based services

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Mobile users frequently change their location and often desire to avail of location-based services (LBS). LBS server provides services to users at the service charge. The user queries the LBS server for services, and the LBS server replies queries’ answer with the associated fee. This exchange may breach the user’s privacy. Users’ query privacy and LBS server services’ privacy is a challenging issue. Many privacy-preserving LBS schemes have been proposed, such as trusted third party, homomorphic encryption, and private information retrieval. These existing schemes mostly suffer from poor efficiency and privacy issue. We propose an efficient privacy-preserving scheme for location-based services (EP2LBS) using a lattice-based oblivious transfer protocol. The proposed EP2LBS scheme’s security depends on the combination of decisional ring-learning with errors assumption and perfect secrecy assumption. This enables the EP2LBS scheme to preserve the user’s query privacy and LBS server’s services privacy. The theoretical and experimental results show that the EP2LBS scheme requires lower communication and computation costs at server and user as compared to the current-state-of-the-art schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

Data Availability

Not applicable

References

  1. Bi B, Huang D, Mi B, Deng Z, Pan H (2019) Efficient lbs security-preserving based on ntru oblivious transfer. Wirel Pers Commun, 1–12

  2. Chen J, He K, Yuan Q, Chen M, Du R, Xiang Y (2018) Blind filtering at third parties: an efficient privacy-preserving framework for location-based services. IEEE Trans Mob Comput 17(11):2524–2535

    Article  Google Scholar 

  3. Chow CY, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems, 171–178. ACM

  4. Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: International Conference on Pervasive Computing, pp 152–170. Springer

  5. Gedik B, Liu L (2007) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mob Comput 7(1):1–18

    Article  Google Scholar 

  6. Ghinita G, Kalnis P, Kantarcioglu M, Bertino E (2009) A hybrid technique for private location-based queries with database protection. In: International Symposium on Spatial and Temporal Databases, pp 98–116. Springer

  7. Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp 121–132. ACM

  8. Ghinita G, Kalnis P, Skiadopoulos S (2007) Mobihide: a mobilea peer-to-peer system for anonymous location-based queries. In: International Symposium on Spatial and Temporal Databases, pp 221–238. Springer

  9. Hu Q, Wang S, Hu C, Huang J, Li W, Cheng X (2018) Messages in a concealed bottle: Achieving query content privacy with accurate location-based services. IEEE Trans Veh Technol 67(8):7698–7711

    Article  Google Scholar 

  10. Hu Z, Liu S, Chen K (2018) Privacy-preserving location-based services query scheme against quantum attacks. IEEE Trans Dependable Secure Comput 17(5):972–983

    Article  Google Scholar 

  11. Jannati H, Bahrak B (2017) An oblivious transfer protocol based on elgamal encryption for preserving location privacy. Wireless Pers Commun 97(2):3113–3123

    Article  Google Scholar 

  12. Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719–1733

    Article  Google Scholar 

  13. Li X, Zhu Y, Wang J (2019) Highly efficient privacy preserving location-based services with enhanced one-round blind filter. IEEE Trans Emerg Topics Comput 9(4):1803–14

    Article  Google Scholar 

  14. Lindell AY (2009) Adaptively secure two-party computation with erasures. In: Cryptographers’ Track at the RSA Conference, pp 117–132. Springer

  15. Paulet R, Kaosar MG, Yi X, Bertino E (2013) Privacy-preserving and content-protecting location based queries. IEEE Trans Knowl Data Eng 26(5):1200–1210

    Article  Google Scholar 

  16. Peikert C (2014) Lattice cryptography for the internet. In: International Workshop on Post-Quantum Cryptography, pp 197–219. Springer

  17. Singh V (2015) A practical key exchange for the internet using lattice cryptography. IACR Cryptol ePrint Archive 2015:138

    Google Scholar 

  18. Yadav VK, Andola N, Verma S, Venkatesan S (2021) P2lbs: privacy provisioning in location-based services. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2021.3123428

    Article  Google Scholar 

  19. Yadav VK, Verma S, Venkatesan S (2020) Efficient and secure location-based services scheme in vanet. IEEE Trans Veh Technol 69(11):13567–13578

    Article  Google Scholar 

  20. Yadav VK, Verma S, Venkatesan S (2021) An efficient and light weight polynomial multiplication for ideal lattice-based cryptography. Multimed Tools Appl 80(2):3089–3120

    Article  Google Scholar 

  21. Yadav VK, Verma S, Venkatesan S (2021) Linkable privacy-preserving scheme for location-based services. IEEE Trans Intell Transp Syst. https://doi.org/10.1109/TITS.2021.3074974

    Article  Google Scholar 

  22. Zhang S, Wang G, Bhuiyan MZA, Liu Q (2018) A dual privacy preserving scheme in continuous location-based services. IEEE Internet Things J 5(5):4191–4200

    Article  Google Scholar 

Download references

Funding

None

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vijay Kumar Yadav.

Ethics declarations

Conflict of interest

Not applicable

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Code availability

Not applicable

Ethics approval

Not applicable

Consent to participate

Not applicable

Consent for publication

Not applicable

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yadav, V.K., Andola, N., Verma, S. et al. EP2LBS: efficient privacy-preserving scheme for location-based services. J Supercomput 78, 14991–15013 (2022). https://doi.org/10.1007/s11227-022-04486-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04486-4

Keywords

Navigation