Verifying Location-Based Services with Declassification Enforcement

  • Cong Sun
  • Sheng Gao
  • Jianfeng Ma
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7235)


Location privacy has been considered to be an important issue along with the advances of location technologies and the pervasive use of location based services. Although a variety of location privacy techniques have been developed, language-based techniques have rarely been used on privacy enforcement of location-based services. In this work, we propose a verification framework to enforce the privacy preservation of locations. The enforcement leverages reachability analysis of pushdown system to ensure that the service-specific data aggregation functions comply with the privacy property. The approach supports inter-procedural analysis and is more precise than existing work.


Mobile Node Location Information Aggregation Function Output Channel Private Location 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Barthe, G., D’Argenio, P.R., Rezk, T.: Secure information flow by self-composition. In: CSFW, pp. 100–114. IEEE Computer Society (2004)Google Scholar
  2. 2.
    Beresford, A., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2(1), 46–55 (2003)CrossRefGoogle Scholar
  3. 3.
    Chow, C.Y., Mokbel, M.F.: Privacy in location-based services: a system architecture perspective. SIGSPATIAL Special 1(2), 23–27 (2009)CrossRefGoogle Scholar
  4. 4.
    Hong, J.I., Landay, J.A.: An architecture for privacy-sensitive ubiquitous computing. In: MobiSys 2004, pp. 177–189. ACM, New York (2004)CrossRefGoogle Scholar
  5. 5.
    Jiang, T., Wang, H.J., Hu, Y.C.: Preserving location privacy in wireless lans. In: MobiSys 2007, pp. 246–257. ACM, New York (2007)CrossRefGoogle Scholar
  6. 6.
    Ravi, N., Gruteser, M., Iftode, L.: Non-inference: An information flow control model for location-based services. In: 3rd International Conference on Mobile and Ubiquitous Systems Workshops, pp. 1–10 (2006)Google Scholar
  7. 7.
    Sabelfeld, A., Myers, A.: A Model for Delimited Information Release. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds.) ISSS 2003. LNCS, vol. 3233, pp. 174–191. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  8. 8.
    Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Tech. Rep. SRI-CSL-98-04, SRI International (1998)Google Scholar
  9. 9.
    Schwoon, S.: Model Checking Pushdown Systems. Ph.D. thesis, Technical University of Munich, Munich, Germany (2002)Google Scholar
  10. 10.
    Sun, C., Tang, L., Chen, Z.: Secure information flow by model checking pushdown system. In: UIC-ATC 2009, pp. 586–591. IEEE Computer Society (2009)Google Scholar
  11. 11.
    Sun, C., Tang, L., Chen, Z.: A new enforcement on declassification with reachability analysis. In: INFOCOM 2011 Workshops, pp. 1024–1029. IEEE (2011)Google Scholar
  12. 12.
    Yiu, M.L., Jensen, C.S., Møller, J., Lu, H.: Design and analysis of a ranking approach to private location-based services. ACM Trans. Database Syst. 36, 1–42 (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Cong Sun
    • 1
  • Sheng Gao
    • 1
  • Jianfeng Ma
    • 1
  1. 1.School of Computer Science and TechnologyXidian UniversityChina

Personalised recommendations