Advertisement

The Shy Mayor: Private Badges in GeoSocial Networks

  • Bogdan Carbunar
  • Radu Sion
  • Rahul Potharaju
  • Moussa Ehsan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7341)

Abstract

Location based social or geosocial networks (GSNs) have recently emerged as a natural combination of location based services with online social networks: users register their location and activities, share it with friends and achieve special status (e.g., “mayorship” badges) based on aggregate location predicates. Boasting millions of users and tens of millions of daily check-ins, such services pose significant privacy threats: user location information may be tracked and leaked to third parties. Conversely, a solution enabling location privacy may provide cheating capabilities to users wanting to claim special location status. In this paper we introduce new mechanisms that allow users to (inter)act privately in today’s geosocial networks while simultaneously ensuring honest behavior. An Android implementation is provided. The Google Nexus One smartphone is shown to be able to perform tens of badge proofs per minute. Providers can support hundreds of million of check-ins and status verifications per day.

Keywords

Online Social Network Blind Signature Location Privacy Quick Response Code Anonymous Authentication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
  3. 3.
  4. 4.
    Indvik, L.: Foursquare Surpasses 3 Million User Registrations, http://mashable.com/2010/08/29/foursquare-3-million-users/
  5. 5.
    O’Dell, J.: Foursquare Day Sets Record with 3M+ Checkins, http://mashable.com/2011/04/20/foursquare-day-2/
  6. 6.
    Albanesius, C.: Apple location, privacy issue prompts house inquiry. PC Mag, http://www.pcmag.com/article2/0,2817,2365619,00.asp
  7. 7.
    Valentino-Devries, J.: Google defends way it gets phone data. Wall Street Journal (2011), http://online.wsj.com/article/SB10001424052748703387904576279451001593760.html
  8. 8.
    Krishnamurthy, B., Wills, C.E.: On the leakage of personally identifiable information via online social networks. In: WOSN, pp. 7–12 (2009)Google Scholar
  9. 9.
    Krishnamurthy, B., Wills, C.E.: On the leakage of personally identifiable information via online social networks. Computer Communication Review 40(1), 112–117 (2010)Google Scholar
  10. 10.
    Lowensohn, J.: Apple sued over location tracking in iOS. Cnet News (2011), http://news.cnet.com/8301-27076_3-20057245-248.html/
  11. 11.
  12. 12.
    Krumm, J.: Inference Attacks on Location Tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127–143. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  13. 13.
    Golle, P., Partridge, K.: On the Anonymity of Home/Work Location Pairs. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 390–397. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  14. 14.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of MobiSys (2003)Google Scholar
  15. 15.
    Hoh, B., Gruteser, M., Herring, R., Ban, J., Work, D., Herrera, J.-C., Bayen, R., Annavaram, M., Jacobson, Q.: Virtual Trip Lines for Distributed Privacy-Preserving Traffic Monitoring. In: Proceedings of ACM MobiSys (2008)Google Scholar
  16. 16.
    Olumofin, F., Tysowski, P.K., Goldberg, I., Hengartner, U.: Achieving Efficient Query Privacy for Location Based Services. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 93–110. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  17. 17.
    Pan, X., Meng, X., Xu, J.: Distortion-based anonymity for continuous queries in location-based mobile services. In: GIS, pp. 256–265 (2009)Google Scholar
  18. 18.
    Ghinita, G., Damiani, M.L., Silvestri, C., Bertino, E.: Preventing velocity-based linkage attacks in location-aware applications. In: GIS, pp. 246–255 (2009)Google Scholar
  19. 19.
    Saroiu, S., Wolman, A.: Enabling New Mobile Applications with Location Proofs. In: Proceedings of HotMobile (2009)Google Scholar
  20. 20.
    Luo, W., Hengartner, U.: VeriPlace: A Privacy-Aware Location Proof Architecture. In: Proceedings of ACM SIGSPATIAL GIS (2010)Google Scholar
  21. 21.
    Zhu, Z., Cao, G.: APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services. In: Proceedings of IEEE INFOCOM (2011)Google Scholar
  22. 22.
    Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three Protocols for Location Privacy. In: Proceedings of PETS (2007)Google Scholar
  23. 23.
    Manweiler, J., Scudellari, R., Cancio, Z., Cox, L.P.: We saw each other on the subway: secure, anonymous proximity-based missed connections. In: Proceedings of HotMobile (2009)Google Scholar
  24. 24.
    Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Proceedings of NDSS (2011)Google Scholar
  25. 25.
    Carbunar, B., Sion, R.: Private geosocial networking. In: Proceedings of the ACM SIGSPATIAL GIS (2011)Google Scholar
  26. 26.
    Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The second-generation onion router. In: USENIX Security Symposium, pp. 303–320 (2004)Google Scholar
  27. 27.
    Reiter, M.K., Rubin, A.D.: Anonymous web transactions with crowds. Commun. ACM 42(2), 32–38 (1999)CrossRefGoogle Scholar
  28. 28.
    Boneh, D., Franklin, M.: Anonymous Authentication With Subset Queries (Extended Abstract). In: Proceedings of CCS (1999)Google Scholar
  29. 29.
    Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1) (1989)Google Scholar
  30. 30.
    Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in np have zero-knowledge proof systems. J. ACM 38(3) (1991)Google Scholar
  31. 31.
    Coley, G.: Beagleboard system reference manual. BeagleBoard.org (December 2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Bogdan Carbunar
    • 1
  • Radu Sion
    • 2
  • Rahul Potharaju
    • 3
  • Moussa Ehsan
    • 2
  1. 1.Florida International University MiamiUSA
  2. 2.Stony Brook UniversityStony BrookUSA
  3. 3.Purdue UniversityWest LafayetteUSA

Personalised recommendations