Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications
This paper proposes an efficient scheme, named CPSS, to perform privacy-preserving proximity detection based on chiphertext of convex polygon spatial search. We consider a scenario where users have to submit their location and search information to the social application server for accessing proximity detection service of location-based social applications (LBSAs). With proximity detection, users can choose any polygon area on the map and search whether their friends are within the select region. Since the location and search information of users are sensitive, submitting these data over plaintext to the social application server raises privacy concerns. Hence, we propose a novel method, with which users can access proximity detection without divulging their search and location information. Specifically, the data of a user is blurred into chipertext in client, thus no one can obtain the sensitive information except the user herself/himself. We prove that the scheme can defend various security threats and validate our scheme using a real LBS dataset. Also, we show that our proposed CPSS is highly efficient in terms of computation complexity and communication overhead.
KeywordsLocation-based social application Proximity detection Privacy-preserving Convex polygon spatial search
H. Zhu is supported in part by National Natural Science Foundation of China (no. 61672411 and U1401251), National Key Research and Development Program of China (no. 2017YFB0802201), Natural Science Basic Research Plan in Shaanxi Province of China (no. 2016JM6007), Research Foundations for the Central Universities of China (no. JB161507), Research Foundations for Science and Technology on Communication Networks Laboratory (no. KX172600023), and China 111 Project (no. B16037).
R. Lu is supported in part by Natural Sciences and Engineering Research (NSERC) Discovery (no. Rgpin 04009), NBIF Start-Up (Nbif Rif 2017-915012), URF (no. Urf Nf-2017-05), and HMF (no. Hmf 2017 Ys-4).
The implementation of the proposed CPSS scheme and relevant information can be downloaded at http://xdzhuhui.com/demo/CPSS.
- 3.Puttaswamy, K.P., Zhao, B.Y.: Preserving privacy in location-based mobile social applications. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems and Applications, pp. 1–6. ACM (2010)Google Scholar
- 4.Li, K.A., Sohn, T.Y., Huang, S., Griswold, W.G.: Peopletones: a system for the detection and notification of buddy proximity on mobile phones. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 160–173. ACM (2008)Google Scholar
- 6.Huang, C., Lu, R., Zhu, H., Shao, J., Alamer, A., Lin, X.: EPPD: efficient and privacy-preserving proximity testing with differential privacy techniques. In: 2016 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2016)Google Scholar
- 7.Chen, Q., Ye, A., Xu, L.: A privacy-preserving proximity detection method in social network. In: Proceedings of the International Conference on Internet of Things and Cloud Computing. ACM (2016). Article No. 68Google Scholar
- 8.Šikšnys, L., Thomsen, J.R., Šaltenis, S., Yiu, M.L.: Private and flexible proximity detection in mobile social networks. In: 2010 Eleventh International Conference on Mobile Data Management, pp. 75–84. IEEE (2010)Google Scholar
- 12.Peng, J., Meng, Y., Xue, M., Hei, X., Ross, K.W.: Attacks and defenses in location-based social networks: a heuristic number theory approach. In: 2015 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec), pp. 64–71. IEEE (2015)Google Scholar
- 14.Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704–719 (2016)Google Scholar
- 18.Wang, Q., Xu, C., Sun, M.: Multi-dimensional k-anonymity based on mapping for protecting privacy. J. Softw. 6(10), 1937–1944 (2011)Google Scholar
- 19.Sharma, V., Shen, C.C.: Evaluation of an entropy-based k-anonymity model for location based services. In: 2015 International Conference on Computing, Networking and Communications (ICNC), pp. 374–378. IEEE (2015)Google Scholar
- 20.Firoozjaei, M.D., Yu, J., Kim, H.: Privacy preserving nearest neighbor search based on topologies in cellular networks. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 146–149. IEEE (2015)Google Scholar
- 25.Wang, S., Wang, X.S.: In-device spatial cloaking for mobile user privacy assisted by the cloud. In: 2010 Eleventh International Conference on Mobile Data Management, pp. 381–386. IEEE (2010)Google Scholar
- 26.Mu, B., Bakiras, S.: Private proximity detection for convex polygons. In: Proceedings of the 12th International ACM Workshop on Data Engineering for Wireless and Mobile Acess, pp. 36–43. ACM (2013)Google Scholar
- 27.Hu, P., Mukherjee, T., Valliappan, A., Radziszowski, S.: Homomorphic proximity computation in geosocial networks. In: 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 616–621. IEEE (2016)Google Scholar
- 28.Thomas, T.: Secure two-party protocols for point inclusion problem. Int. J. Netw. Secur. 9(1), 1–7 (2009)Google Scholar