Show simple item record

dc.contributor.authorAshouri-Talouki, M.en_US
dc.contributor.authorBaraani-Dastjerdi, A.en_US
dc.contributor.authorSelçuk, A. A.en_US
dc.date.accessioned2015-07-28T12:04:23Z
dc.date.available2015-07-28T12:04:23Z
dc.date.issued2012-07-01en_US
dc.identifier.issn0140-3664
dc.identifier.urihttp://hdl.handle.net/11693/13026
dc.description.abstractRecently, location privacy during the use of location-based services (LBSs) has raised considerable concerns. There is a wide literature on location privacy from the individual point of view; however, there exist only a few works to support location privacy for a group of users. In this paper, we consider location privacy issues for a group of users who may ask an LBS for a meeting place that minimizes their aggregate distance. The proposed solution, which we call the Group Location Privacy (GLP) protocol, is based on the Anonymous Veto network (AV-net) and homomorphic encryption. It preserves the location privacy of all users even in the case of collusion. Our solution also tries to minimize the LBS overhead for nearest neighbor (NN) queries and communication, i.e., to decrease the number of NN queries sent to an LBS and the number of points of interest (POIs) it returns. Furthermore, GLP greatly decreases the bandwidth usage to a high extent and protects the LBS provider from excessive disclosure of POIs. We discuss the performance and security analysis of the GLP protocol and show that the proposed protocol is secure against partial collusion in a malicious model. (c) 2012 Elsevier B.V. All rights reserved.en_US
dc.language.isoEnglishen_US
dc.source.titleComputer Communicationsen_US
dc.relation.isversionofhttp://dx.doi.org/10.1016/j.comcom.2012.04.019en_US
dc.subjectLocation privacyen_US
dc.subjectGroup nearest neighbor queryen_US
dc.subjectSecure multiparty computationen_US
dc.subjectLocation- based serviceen_US
dc.subjectQueriesen_US
dc.titleGLP: a cryptographic approach for group location privacyen_US
dc.typeArticleen_US
dc.departmentDepartment of Computer Engineeringen_US
dc.citation.spage1527en_US
dc.citation.epage1533en_US
dc.citation.volumeNumber35en_US
dc.citation.issueNumber12en_US
dc.identifier.doi10.1016/j.comcom.2012.04.019en_US
dc.publisherElsevier BVen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record