Advertisement

Resilient Collaborative Privacy for Location-Based Services

  • Hongyu Jin
  • Panos Papadimitratos
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9417)

Abstract

Location-based Services (LBSs) provide valuable services, with convenient features for users. However, the information disclosed through each request harms user privacy. This is a concern particularly with honest-but-curious LBS servers, which could, by collecting requests, track users and infer additional sensitive user data. This is the motivation of both centralized and decentralized location privacy protection schemes for LBSs: anonymizing and obfuscating LBS queries to not disclose exact information, while still getting useful responses. Decentralized schemes overcome the disadvantages of centralized schemes, eliminating anonymizers and enhancing users’ control over sensitive information. However, an insecure decentralized system could pose even more serious security threats than privacy leakage. We address exactly this problem, by proposing security enhancements for mobile data sharing systems. We protect user privacy while preserving accountability of user activities, leveraging pseudonymous authentication with mainstream cryptography. Our design leverages architectures proposed for large scale mobile systems, while it incurs minimal changes to LBS servers as it can be deployed in parallel to the LBS servers. This further motivates the adoption of our design, in order to cater to the needs of privacy-sensitive users. We provide an analysis of security and privacy concerns and countermeasures, as well as a performance evaluation of basic protocol operations showing the practicality of our design.

Keywords

Location-based service Security and privacy Pseudonymous authentication 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
  3. 3.
    The Spongy Castle Cryptography APIs. https://rtyley.github.io/spongycastle/
  4. 4.
  5. 5.
  6. 6.
  7. 7.
    IEEE Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages. IEEE Std 1609.2-2013 (2013)Google Scholar
  8. 8.
    Barkhuus, L., Dey, A.K.: Location-based services for mobile telephony: a study of users’ privacy concerns. In: INTERACT, Cape Town, South Africa, September 2003Google Scholar
  9. 9.
    Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: Efficient and robust pseudonymous authentication in vanet. In: ACM VANET, Montreal, Canada, September 2007Google Scholar
  10. 10.
    Calandriello, G., Papadimitratos, P., Hubaux, J.-P., Lioy, A.: On the performance of secure vehicular communication systems. In: IEEE TDSC (2011)Google Scholar
  11. 11.
    Chow, C.-Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: ACM GIS, New York, NY, November 2006Google Scholar
  12. 12.
    Cutillo, L.A., Molva, R., Strufe, T.: Privacy preserving social networking through decentralization. In: IEEE/IFIP WONS, Snowbird, Utah, February 2009Google Scholar
  13. 13.
    Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Transactions on Mobile Computing, January 2008Google Scholar
  14. 14.
    Ghinita, G., Kalnis, P., Skiadopoulos, S.: Mobihide: a mobilea peer-to-peer system for anonymous location-based queries. In: SSTD, Boston, MA, July 2007Google Scholar
  15. 15.
    Gisdakis, S., Giannetsos, T., Papadimitratos, P.: Sppear: security & privacy-preserving architecture for participatory-sensing applications. In: ACM WiSec, Oxford, UK, July 2014Google Scholar
  16. 16.
    Gisdakis, S., Laganà, M., Giannetsos, T., Papadimitratos, P.: Serosa: Service oriented security architecture for vehicular communications. In: IEEE VNC, Boston, MA, December 2013Google Scholar
  17. 17.
    Han, L., Nath, B., Iftode, L., Muthukrishnan, S.: Social butterfly: Social caches for distributed social networks. In: PASSAT, Boston, MA, October 2011Google Scholar
  18. 18.
    Johnson, M., McGuire, D., Willey, N.: The evolution of the peer-to-peer file sharing industry and the security risks for users. In: HICSS, Waikoloa, Big Island, Hawaii, January 2008Google Scholar
  19. 19.
    Khodaei, M., Jin, H., Papadimitratos, P.: Towards deploying a scalable & robust vehicular identity and credential management infrastructure. In: IEEE VNC, Paderborn, Germany, December 2014Google Scholar
  20. 20.
    Kwok, S.H., Lang, K.R., Tam, K.Y.: Peer-to-peer technology business and service models: risks and opportunities. Electronic Markets (2002)Google Scholar
  21. 21.
    Louail, T., Lenormand, M., Cantu Ros, O.G., Picornell, M., Herranz, R., Frias-Martinez, E., Ramasco, J.J., Barthelemy, M.: From mobile phone data to the spatial structure of cities. Scientific Reports, June 2014Google Scholar
  22. 22.
    Martucci, L.A., Kohlweiss, M., Andersson, C., Panchenko, A.: Self-certified sybil-free pseudonyms. In: ACM WiSec, Alexandria, VA, April 2008Google Scholar
  23. 23.
    Mascetti, S., Bettini, C., Freni, D., Wang, X.S.: Spatial generalisation algorithms for lbs privacy preservation. Journal of Location Based Services (2007)Google Scholar
  24. 24.
    Mezzour, G., Perrig, A., Gligor, V., Papadimitratos, P.: Privacy-preserving relationship path discovery in social networks. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 189–208. Springer, Heidelberg (2009) CrossRefGoogle Scholar
  25. 25.
    Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very large Data Bases, Seoul, Korea, September 2006Google Scholar
  26. 26.
    Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. IEEE Pervasive Computing (2003)Google Scholar
  27. 27.
    Papadimitratos, P., Calandriello, G., Lioy, A., Hubaux, J.-P.: Impact of vehicular communication security on transportation safety. In: IEEE INFOCOM MOVE, Phoenix, AZ, April 2008Google Scholar
  28. 28.
    Sampigethaya, K., Li, M., Huang, L., Poovendran, R.: Amoeba: Robust location privacy scheme for vanet. IEEE JSAC (2007)Google Scholar
  29. 29.
    Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., Hubaux, J.-P.: Hiding in the mobile crowd: Location privacy through collaboration. IEEE TDSC (2014)Google Scholar
  30. 30.
    Zhou, L., Zhang, L., McSherry, F., Immorlica, N., Costa, M., Chien, S.: A first look at peer-to-peer worms: threats and defenses. In: Proceedings of the 4th International Conference on Peer-to-Peer Systems, Konstanz, Germany, August 2005Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Hongyu Jin
    • 1
  • Panos Papadimitratos
    • 1
  1. 1.Networked Systems Security GroupKTH Royal Institute of TechnologyStockholmSweden

Personalised recommendations