Advertisement

Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications

  • Fengwei Wang
  • Hui ZhuEmail author
  • Rongxing Lu
  • Fen Liu
  • Cheng Huang
  • Hui Li
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 238)

Abstract

This paper proposes an efficient scheme, named CPSS, to perform privacy-preserving proximity detection based on chiphertext of convex polygon spatial search. We consider a scenario where users have to submit their location and search information to the social application server for accessing proximity detection service of location-based social applications (LBSAs). With proximity detection, users can choose any polygon area on the map and search whether their friends are within the select region. Since the location and search information of users are sensitive, submitting these data over plaintext to the social application server raises privacy concerns. Hence, we propose a novel method, with which users can access proximity detection without divulging their search and location information. Specifically, the data of a user is blurred into chipertext in client, thus no one can obtain the sensitive information except the user herself/himself. We prove that the scheme can defend various security threats and validate our scheme using a real LBS dataset. Also, we show that our proposed CPSS is highly efficient in terms of computation complexity and communication overhead.

Keywords

Location-based social application Proximity detection Privacy-preserving Convex polygon spatial search 

Notes

Acknowledgement

H. Zhu is supported in part by National Natural Science Foundation of China (no. 61672411 and U1401251), National Key Research and Development Program of China (no. 2017YFB0802201), Natural Science Basic Research Plan in Shaanxi Province of China (no. 2016JM6007), Research Foundations for the Central Universities of China (no. JB161507), Research Foundations for Science and Technology on Communication Networks Laboratory (no. KX172600023), and China 111 Project (no. B16037).

R. Lu is supported in part by Natural Sciences and Engineering Research (NSERC) Discovery (no. Rgpin 04009), NBIF Start-Up (Nbif Rif 2017-915012), URF (no. Urf Nf-2017-05), and HMF (no. Hmf 2017 Ys-4).

Availability

The implementation of the proposed CPSS scheme and relevant information can be downloaded at http://xdzhuhui.com/demo/CPSS.

References

  1. 1.
    Valente, T.W.: Network interventions. Science 337(6090), 49–53 (2012)CrossRefGoogle Scholar
  2. 2.
    Zhu, H., Lu, R., Huang, C., Chen, L., Li, H.: An efficient privacy-preserving location based services query scheme in outsourced cloud. IEEE Trans. Veh. Technol. 65(9), 7729–7739 (2016)CrossRefGoogle Scholar
  3. 3.
    Puttaswamy, K.P., Zhao, B.Y.: Preserving privacy in location-based mobile social applications. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, pp. 1–6. ACM (2010)Google Scholar
  4. 4.
    Li, K.A., Sohn, T.Y., Huang, S., Griswold, W.G.: Peopletones: a system for the detection and notification of buddy proximity on mobile phones. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 160–173. ACM (2008)Google Scholar
  5. 5.
    Bolic, M., Rostamian, M., Djuric, P.M.: Proximity detection with RFID: a step toward the internet of things. IEEE Pervasive Comput. 14(2), 70–76 (2015)CrossRefGoogle Scholar
  6. 6.
    Huang, C., Lu, R., Zhu, H., Shao, J., Alamer, A., Lin, X.: EPPD: efficient and privacy-preserving proximity testing with differential privacy techniques. In: 2016 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2016)Google Scholar
  7. 7.
    Chen, Q., Ye, A., Xu, L.: A privacy-preserving proximity detection method in social network. In: Proceedings of the International Conference on Internet of Things and Cloud Computing. ACM (2016). Article No. 68Google Scholar
  8. 8.
    Šikšnys, L., Thomsen, J.R., Šaltenis, S., Yiu, M.L.: Private and flexible proximity detection in mobile social networks. In: 2010 Eleventh International Conference on Mobile Data Management, pp. 75–84. IEEE (2010)Google Scholar
  9. 9.
    Zhu, H., Liu, F., Li, H.: Efficient and privacy-preserving polygons spatial query framework for location-based services. IEEE Internet Things J. 4(2), 536–545 (2016)CrossRefGoogle Scholar
  10. 10.
    Enserink, M.: Risk of exposure. Science 347(6221), 498–500 (2015)CrossRefGoogle Scholar
  11. 11.
    Li, L., Lu, R., Choo, K.K.R., Datta, A., Shao, J.: Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE Trans. Inf. Forensics Secur. 11(8), 1847–1861 (2016)CrossRefGoogle Scholar
  12. 12.
    Peng, J., Meng, Y., Xue, M., Hei, X., Ross, K.W.: Attacks and defenses in location-based social networks: a heuristic number theory approach. In: 2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), pp. 64–71. IEEE (2015)Google Scholar
  13. 13.
    Huang, C., Yan, Z., Li, N., Wang, M.: Secure pervasive social communications based on trust in a distributed way. IEEE Access 4, 9225–9238 (2016)CrossRefGoogle Scholar
  14. 14.
    Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704–719 (2016)Google Scholar
  15. 15.
    Niu, B., Zhu, X., Li, Q., Chen, J., Li, H.: A novel attack to spatial cloaking schemes in location-based services. Future Gener. Comput. Syst. 49, 125–132 (2015)CrossRefGoogle Scholar
  16. 16.
    Ohno-Machado, L.: To share or not to share: that is not the question. Sci. Transl. Med. 4(165), 165cm15 (2012)CrossRefGoogle Scholar
  17. 17.
    Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4), 46–50 (2014)CrossRefGoogle Scholar
  18. 18.
    Wang, Q., Xu, C., Sun, M.: Multi-dimensional k-anonymity based on mapping for protecting privacy. J. Softw. 6(10), 1937–1944 (2011)Google Scholar
  19. 19.
    Sharma, V., Shen, C.C.: Evaluation of an entropy-based k-anonymity model for location based services. In: 2015 International Conference on Computing, Networking and Communications (ICNC), pp. 374–378. IEEE (2015)Google Scholar
  20. 20.
    Firoozjaei, M.D., Yu, J., Kim, H.: Privacy preserving nearest neighbor search based on topologies in cellular networks. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 146–149. IEEE (2015)Google Scholar
  21. 21.
    Chow, C.Y., Mokbel, M.F., Liu, X.: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2), 351–380 (2011)CrossRefGoogle Scholar
  22. 22.
    Yi, X., Paulet, R., Bertino, E., Varadharajan, V.: Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowl. Data Eng. 28(6), 1546–1559 (2016)CrossRefGoogle Scholar
  23. 23.
    Sweeney, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)MathSciNetCrossRefGoogle Scholar
  24. 24.
    Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mobile Comput. 7(1), 1–18 (2008)CrossRefGoogle Scholar
  25. 25.
    Wang, S., Wang, X.S.: In-device spatial cloaking for mobile user privacy assisted by the cloud. In: 2010 Eleventh International Conference on Mobile Data Management, pp. 381–386. IEEE (2010)Google Scholar
  26. 26.
    Mu, B., Bakiras, S.: Private proximity detection for convex polygons. In: Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess, pp. 36–43. ACM (2013)Google Scholar
  27. 27.
    Hu, P., Mukherjee, T., Valliappan, A., Radziszowski, S.: Homomorphic proximity computation in geosocial networks. In: 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 616–621. IEEE (2016)Google Scholar
  28. 28.
    Thomas, T.: Secure two-party protocols for point inclusion problem. Int. J. Netw. Secur. 9(1), 1–7 (2009)Google Scholar
  29. 29.
    Feito, F., Torres, J.C., Urena, A.: Orientation, simplicity, and inclusion test for planar polygons. Comput. Graph. 19(4), 595–600 (1995)CrossRefGoogle Scholar
  30. 30.
    Zhu, H., Liu, X., Lu, R., Li, H.: Efficient and privacy-preserving online medical pre-diagnosis framework using nonlinear SVM. IEEE J. Biomed. Health Inform. 21(3), 1 (2016)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  • Fengwei Wang
    • 1
    • 4
  • Hui Zhu
    • 1
    Email author
  • Rongxing Lu
    • 2
  • Fen Liu
    • 1
  • Cheng Huang
    • 3
  • Hui Li
    • 1
  1. 1.State Key Laboratory of Integrated Services NetworksXidian UniversityXi’anChina
  2. 2.Faculty of Computer ScienceUniversity of New BrunswickFrederictonCanada
  3. 3.Department of Electrical and Computer EngineeringUniversity of WaterlooWaterlooCanada
  4. 4.Science and Technology on Communication Networks LaboratoryShijiazhuangChina

Personalised recommendations