The cloaked-centroid protocol: location privacy protection for a group of users of location-based services

dc.citation.epage615en_US
dc.citation.issueNumber3en_US
dc.citation.spage589en_US
dc.citation.volumeNumber45en_US
dc.contributor.authorAshouri-Talouki, M.en_US
dc.contributor.authorBaraani-Dastjerdi, A.en_US
dc.contributor.authorSelçuk, A. A.en_US
dc.date.accessioned2019-01-29T10:45:36Z
dc.date.available2019-01-29T10:45:36Z
dc.date.issued2012-08-17en_US
dc.departmentDepartment of Computer Engineeringen_US
dc.description.abstractSeveral techniques have been recently proposed to protect user location privacy while accessing location-based services (LBSs). However, applying these techniques to protect location privacy for a group of users would lead to user privacy leakage and query inefficiency. In this paper, we propose a two-phase protocol, we name Cloaked-Centroid, which is designed specifically to protect location privacy for a group of users. We identify location privacy issues for a group of users who may ask an LBS for a meeting place that is closest to the group centroid. Our protocol relies on spatial cloaking, an anonymous veto network and a conference key establishment protocol. In the first phase, member locations are cloaked into a single region based on their privacy profiles, and then, a single query is submitted to an LBS. In the second phase, a special secure multiparty computation extracts the meeting point result from the received answer set. Our protocol is resource aware, taking into account the LBS overhead and the communication cost, i.e., the number of nearest neighbor queries sent to a service provider and the number of returned points of interests. Regarding privacy, Cloaked-Centroid protects the location privacy of each group member from those in the group and from anyone outside the group, including the LBS. Moreover, our protocol provides result-set anonymity, which prevents LBS providers and other possible attackers from learning the meeting place location. Extensive experiments show that the proposed protocol is efficient in terms of computation and communication costs. A security analysis shows the resistance of the protocol against collusion, disruption and background knowledge attacks in a malicious model.en_US
dc.identifier.doi10.1007/s10115-014-0809-0en_US
dc.identifier.issn0219-1377en_US
dc.identifier.urihttp://hdl.handle.net/11693/48478en_US
dc.language.isoEnglishen_US
dc.publisherSpringer U Ken_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/s10115-014-0809-0en_US
dc.source.titleKnowledge and Information Systems : an international journalen_US
dc.subjectLocation privacyen_US
dc.subjectGroup privacyen_US
dc.subjectLocation-based servicesen_US
dc.subjectSecure multiparty computationen_US
dc.titleThe cloaked-centroid protocol: location privacy protection for a group of users of location-based servicesen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
The_Cloaked_Centroid_protocol_location_privacy.pdf
Size:
3.17 MB
Format:
Adobe Portable Document Format
Description:
Full printable version

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: