Selective Location Blinding Using Hash Chains

  • Gabriele Lenzini
  • Sjouke Mauw
  • Jun Pang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7114)


Location-based applications require a user’s movements and positions to provide customized services. However, location is a sensitive piece of information that should not be revealed unless strictly necessary. In this paper we propose a procedure that allows a user to control the precision in which his location information is exposed to a service provider, while allowing his location to be certified by a location verifier. Our procedure makes use of a hash chain to certify the location information in such a way that the hashes of the chain correspond to an increasing level of precision.


Service Provider Global Position System Location Privacy User Device Global Position System Satellite 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Balasch, J., Rial, A., Troncoso, C., Geuens, C.: PrETP: Privacy-preserving electronic toll pricing. In: Proc. USENIX Security Symposium, pp. 63–78. USENIX (2010)Google Scholar
  2. 2.
    Cheng, R., Zhang, Y., Hwang, J., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 393–412. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  3. 3.
    Chow, C.-Y., Mokbel, M.F., Aref, W.G.: Casper ⋆ : Query processing for location services without compromising privacy. ACM Transactions on Database Systems 34(4), 1–48 (2009)CrossRefGoogle Scholar
  4. 4.
    Freudiger, J., Manshaei, M.H., Hubaux, J.P., Parkes, D.C.: On non-cooperative location privacy: a game-theoretic analysis. In: Proc. 16th ACM Conference on Computer and Communications Security, pp. 324–337. ACM Press (2009)Google Scholar
  5. 5.
    Graham, M., Gray, D.: Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol. In: Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. LNICST, vol. 17, pp. 160–171. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  6. 6.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. 1st Conference on Mobile Systems, Applications, and Services. USENIX (2003)Google Scholar
  7. 7.
    Harpes, C., Jager, B., Gent, B.: Secure localisation with location assurance provider. In: Proc. European Navigation Conference - Global Navigation Satellite Systems (2009)Google Scholar
  8. 8.
    Kalman, R.E.: A new approach to linear filtering and prediction problems. Journal of Basic Engineering 82(1), 35–45 (1960)CrossRefGoogle Scholar
  9. 9.
    Køien, G.M., Oleshchuk, V.A.: Location Privacy for Cellular Systems; Analysis and Solution. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 40–58. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. 10.
    Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proc. 5th ACM Workshop on Privacy in the Electronic Society, pp. 19–28. ACM Press (2006)Google Scholar
  11. 11.
    Popa, R.A., Balakrishnan, H., Blumberg, A.J.: VPriv: Protecting privacy in location-based vehicular services. In: Proc. USENIX Security Symposium, pp. 335–350. USENIX (2009)Google Scholar
  12. 12.
    Saroiu, S., Wolman, A.: Enabling new mobile applications with location proofs. In: Proc. 10th Workshop on Mobile Computing Systems and Applications. ACM Press (2009)Google Scholar
  13. 13.
    Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proc. ACM Workshop on Wireless Security, pp. 1–10. ACM Press (2003)Google Scholar
  14. 14.
    Warner, J.S., Johnston, R.G.: A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. Journal of Security Administration 25, 19–28 (2002)Google Scholar
  15. 15.
    Winterbottom, J., Thomson, M., Tschofenig, H.: GEOPRIV Presence Information Data Format Location Object (PIDF-LO) Usage Clarification, Considerations, and Recommendations. Tech. Rep. RFC 5491, IETF Network Working Group (March 2009)Google Scholar
  16. 16.
    Zhong, G., Hengartner, U.: Toward a distributed k-anonymity protocol for location privacy. In: Proc. 7th ACM Workshop on Privacy in the Electronic Society, pp. 33–38. ACM Press (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Gabriele Lenzini
    • 1
  • Sjouke Mauw
    • 1
    • 2
  • Jun Pang
    • 2
  1. 1.Interdisciplinary Centre for Security, Reliability and TrustUniversity of LuxembourgLuxembourg
  2. 2.Computer Science and CommunicationsUniversity of LuxembourgLuxembourg

Personalised recommendations