Advertisement

Efficient Query Processing with Mutual Privacy Protection for Location-Based Services

  • Shushu Liu
  • An LiuEmail author
  • Lei Zhao
  • Guanfeng Liu
  • Zhixu Li
  • Pengpeng Zhao
  • Kai Zheng
  • Lu Qin
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9643)

Abstract

Data privacy in location-based services involves two aspects. The location of a user is a kind of private data as many sensitive information can be inferred from it given some background knowledge. On the other hand, the POI database is a great asset to the LBS provider as its construction requires many resources and efforts. In this paper, we propose a method of protecting mutual privacy (i.e., the location of the user issuing a query and the POI database of the LBS provider) for location-based query processing. Our approach consists of two steps: data preparation and query processing. Data preparation is conducted by LBS itself and is totally an offline computation, while query processing involves some online computation and multiple rounds of communication between LBS and the user. We implement the query processing by two rounds of oblivious transfer extension (OT-Extension) on two small key sets, resulting an immediate response even on some big POI databases. We also theoretically prove the security and analyze the complexity of our approach. Compared with two state-of-the-art methods, our approach has several orders of magnitude improvement in response time, at the expense of little and acceptable communication cost.

Keywords

Privacy Query processing Location-based services 

Notes

Acknowledgment

This work was partially supported by Natural Science Foundation of China (Grant Nos. 61572336, 61572335, 61532018, 61402313, 61402312, 61303019), and Natural Science Foundation of Jiangsu Province (Grant No. BK20151223).

References

  1. 1.
    Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)CrossRefGoogle Scholar
  2. 2.
    Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol. 3674, pp. 185–199. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Bettini, S.M.C.: A comparison of spatial generalization algorithms for LBS privacy preservation. In: MDM, pp. 258–262 (2007)Google Scholar
  4. 4.
    Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: WWW, pp. 237–246 (2008)Google Scholar
  5. 5.
    Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: SIGSPATIAL, pp. 171–178 (2006)Google Scholar
  6. 6.
    Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: ICDCS, pp. 620–629 (2005)Google Scholar
  7. 7.
    Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD, pp. 121–132 (2008)Google Scholar
  8. 8.
    Kushilevitz, E., Ostrovsky, R.: Replication is not needed: Single database, computationally-private information retrieval. In: FOCS, p. 364 (1997)Google Scholar
  9. 9.
    Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS, pp. 88–97 (2005)Google Scholar
  10. 10.
    Krumm, J.: A survey of computational location privacy. Pers. Ubiquit. Comput. 13(6), 391–399 (2009)CrossRefGoogle Scholar
  11. 11.
    Liu, G., Wang, Y., Orgun, M.A.: Optimal social trust path selection in complex social networks. AAAI 10, 1397–1398 (2010)Google Scholar
  12. 12.
    Liu, A., Zhengy, K., Liz, L., Liu, G., Zhao, L., Zhou, X.: Efficient secure similarity computation on encrypted trajectory data. In: ICDE, pp. 66–77 (2015)Google Scholar
  13. 13.
    Myles, G., Friday, A., Davies, N.: Preserving privacy in environments with location-based applications. JPCC 2(1), 56–64 (2003)Google Scholar
  14. 14.
    Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: VLDB, pp. 763–774 (2006)Google Scholar
  15. 15.
    Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 573–590. Springer, Heidelberg (1999)Google Scholar
  16. 16.
    Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)Google Scholar
  17. 17.
    Papadopoulos, S., Bakiras, S., Papadias, D.: Nearest neighbor search with strong location privacy. PVLDB 3(1–2), 619–629 (2010)Google Scholar
  18. 18.
    Paulet, R., Kaosar, M.G., Yi, X., Bertino, E.: Privacy-preserving and content-protecting location based queries. TKDE 26(5), 1200–1210 (2014)Google Scholar
  19. 19.
    Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization, MIT Lab for Computer Science, Technical report (1979)Google Scholar
  20. 20.
    Shang, S., Yuan, B., Deng, K., Xie, K., Zheng, K., Zhou, X.: PNN query processing on compressed trajectories. GEOINFORMATICA 16(3), 467–496 (2012)CrossRefGoogle Scholar
  21. 21.
    Shang, S., Ding, R., Zheng, K., Jensen, C.S., Kalnis, P., Zhou, X.: Personalized trajectory matching in spatial networks. VLDB J 23(3), 449–468 (2014)CrossRefGoogle Scholar
  22. 22.
    Youssef, M., Atluri, V., Adam, N.R.: Preserving mobile customer privacy: an access control system for moving objects and customer profiles. In: MDM, pp. 67–76 (2005)Google Scholar
  23. 23.
    Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: ICDE, pp. 366–375 (2008)Google Scholar
  24. 24.
    Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical k nearest neighbor queries with location privacy. In: ICDE, pp. 640–651 (2014)Google Scholar
  25. 25.
    Zheng, K., Zheng, Y., Yuan, N.J., Shang, S., Zhou, X.: Online discovery of gathering patterns over trajectories. TKDE 26(8), 1974–1988 (2014)Google Scholar
  26. 26.
    Zheng, K., Zhou, X., Fung, P.C., Xie, K.: Spatial query processing for fuzzy objects. VLDB J 21(5), 729–751 (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Shushu Liu
    • 1
  • An Liu
    • 1
    Email author
  • Lei Zhao
    • 1
  • Guanfeng Liu
    • 1
  • Zhixu Li
    • 1
    • 2
  • Pengpeng Zhao
    • 1
  • Kai Zheng
    • 1
    • 2
  • Lu Qin
    • 2
  1. 1.School of Computer Science and TechnologySoochow UniversitySuzhouChina
  2. 2.School of ITEEThe University of QueenslandBrisbaneAustralia

Personalised recommendations