Advertisement

Public Key Cryptosystem for Privacy Sensitive Location-Based Services

  • K. M. Mahesh Kumar
  • N. R. Sunitha
Conference paper

Abstract

Almost every smartphone and wireless devices are equipped with GPS and other location-enabling technologies, which has enabled users to access location-based services, a popular service offered based on the user’s geographical location. In order to get a wide range of location-based services like locating nearby friends and locating nearby places/venues or public places (point of interest), users are forced to reveal their actual location; users are left with no option other than compromise location information causing privacy risk. In this paper, we revisited a protocol proposed by Muhammad N. Sakib and Chin-Tser Huang based on ECC concepts for proximity testing to preserve users location privacy. We made suitable modifications to the existing solution to overcome the false negatives in proximity testing and to reduce the unnecessary communication and computation cost. We have suggested an improvement to enable symmetric key exchange between communicating parties which can be used to securely share the location coordinates to calculate the actual distance between communicating parties. Our scheme withstands triangulation attacks and reveals no information about user’s exact location to either service providers or communicating parties or attackers, unless it is revealed by the user himself/herself.

Keywords

Elliptic curve cryptography Location based services Location privacy Public key cryptosystem 

References

  1. 1.
    Freni, D., Vicente, C.R., Mascetti, S., Bettini, C., Jensen, C.S.: Preserving location and absence privacy in geo-social networks. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management - CIKM ’10. ACM Press, New York (2010). https://doi.org/10.1145/1871437.1871480
  2. 2.
    Hallgren, P., Ochoa, M., Sabelfeld, A.: InnerCircle: a parallelizable decentralized privacy-preserving location proximity protocol. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST). IEEE, New York (2015). https://doi.org/10.1109/pst.2015.7232947
  3. 3.
    Hankerson, D., Menezes, A.: Elliptic Curve Discrete Logarithm Problem, pp. 397–400. Springer, Boston (2011). https://doi.org/10.1007/978-1-4419-5906-5_246
  4. 4.
    Magkos, E.: Cryptographic approaches for privacy preservation in location-based services: a survey. Int. J. Inf. Technol. Syst. Approach 4(2), 48–69 (2011). http://dx.doi.org/10.4018/jitsa.2011070104
  5. 5.
    Mascetti, S., Freni, D., Bettini, C., Wang, X.S., Jajodia, S.: Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J. 20(4), 541–566 (2010). https://doi.org/10.1007/s00778-010-0213-7
  6. 6.
    Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, CA, 6th February - 9th February 2011 (2011). http://www.isoc.org/isoc/conferences/ndss/11/pdf/1_3.pdf
  7. 7.
    Sakib, M.N., Huang, C.T.: Privacy preserving proximity testing using elliptic curves. In: 2016 26th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, New York (2016). https://doi.org/10.1109/atnac.2016.7878794
  8. 8.
    Šeděnka, J., Gasti, P.: Privacy-preserving distance computation and proximity testing on earth, done right. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’14, pp. 99–110. ACM, New York (2014). http://doi.acm.org/10.1145/2590296.2590307
  9. 9.
    Šikšnys, L., Thomsen, J.R., Šaltenis, S., Yiu, M.L., Andersen, O.: A Location Privacy Aware Friend Locator, pp. 405–410. Springer, Berlin (2009). http://dx.doi.org/10.1007/978-3-642-02982-0_29
  10. 10.
    Šikšnys, L., Thomsen, J.R., Šaltenis, S., Yiu, M.L.: Private and flexible proximity detection in mobile social networks. In: 2010 Eleventh International Conference on Mobile Data Management. IEEE, New York (2010). https://doi.org/10.1109/mdm.2010.43
  11. 11.
    Talukder, N., Ahamed, S.I.: Preventing multi-query attack in location-based services. In: Proceedings of the Third ACM Conference on Wireless Network Security, WiSec ’10, pp. 25–36. ACM, New York (2010). http://doi.acm.org/10.1145/1741866.1741873
  12. 12.
    Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three Protocols for Location Privacy, pp. 62–76. Springer, Berlin (2007). http://dx.doi.org/10.1007/978-3-540-75551-7_5

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • K. M. Mahesh Kumar
    • 1
  • N. R. Sunitha
    • 1
  1. 1.Department of CSESiddaganga Institute of TechnologyTumakuruIndia

Personalised recommendations