Skip to main content

Advertisement

Springer Nature Link
Account
Menu
Find a journal Publish with us Track your research
Search
Saved research
Cart
  1. Home
  2. International Journal of Networked and Distributed Computing
  3. Article

CSEP: Circular Shifting Encryption Protocols for Location Privacy Protection

  • Research Article
  • Open access
  • Published: 03 July 2017
  • Volume 5, pages 123–132, (2017)
  • Cite this article

You have full access to this open access article

Download PDF
Save article
View saved research
International Journal of Networked and Distributed Computing Aims and scope Submit manuscript
CSEP: Circular Shifting Encryption Protocols for Location Privacy Protection
Download PDF
  • Chen Di1,
  • Zhao Binglin2,
  • Li Hao1 &
  • …
  • Zhou Shilei1 
  • 98 Accesses

  • 2 Citations

  • Explore all metrics

Abstract

Location Based Service (LBS) is gaining popularity. As one fundamental LBS service, range search returns all Point of Interests (POIs) within a user-specified range. However, people leave their location privacy at risks when using range search. How to provide a high-quality range search service while protecting users’ location privacy is a challenging problem. Most existing approaches use space-filling curves and cloaked region method to provide privacy-preservation location services, but these methods cannot return the accurate results. In this paper, we propose a set of Circular Shifting Encryption Protocols (CSEP) based on homomorphism and circular shift for location privacy protection of range search. CSEP leverages homomorphism encryption to encrypt users’ locations, and LBS servers compute distances on cyphertext. In this way, LBS server can return POIs within the specified range, while learning nothing about the user’s real location. To accommodate the different query range and the private protection degree of users, we propose a circular shifting encryption method to reduce the redundancy and increase the degree of privacy protection. We implement a prototype of CSEP, and evaluate it with real POI set of a large-scale production LBS. Experimental results show that CSEP can provide reliable privacy protection and accurate range search, with reasonable compute overhead and communication overhead.

Article PDF

Download to read the full article text

Similar content being viewed by others

Hybrid Cryptographic Based Approach for Privacy Preservation in Location-Based Services

Chapter © 2019

Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications

Chapter © 2018

Pricing Privacy Leakage in Location-Based Services

Chapter © 2017

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Circular Dichroism Spectroscopy
  • Chromosome conformation capture-based methods
  • Cryptology
  • Data Privacy
  • Privacy
  • Security Services
  • Differential Privacy Techniques in Data Protection

References

  1. S.B.Wicker, “The loss of location privacy in the cellularage,” Commun.ACM, vol. 55, no. 8, pp. 60–68, Aug.2012.[Online].Available:http://doi.acm.org/10.1145/2240236.2240255

  2. Niu B, Li Q, Zhu X, et al. Achieving k-anonymity in privacy-aware location-based services[C]// IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. IEEE, 2014:754–762.

  3. Zhangwei H, Mingjun X. A Distributed Spatial Cloaking Protocol for Location Privacy[C]// Second International Conference on Networks Security Wireless Communications and Trusted Computing. IEEE, 2010:468–471.

  4. M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu, “Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services,” in ICDE, 2008.

  5. Bamba B, Liu L, Pesti P, et al. Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid[C]// International Conference on World Wide Web. ACM, 2008:237–246.

  6. G.Ghinita, P.Kalnis, A.Khoshgozaran, C.Shahabi, and K.-L.Tan, “Private queries in location based services: anonymizers are not necessary.” In International Comference on Management of Data, 2008

  7. A. Khoshgozaran and C. Shahabi, “Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy,” in Advances in Spatial and Temporal Databases, 2007.

  8. Ghinita G. Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy[J]. Transactions on Data Privacy, 2009, 2(1):3–19.

    Google Scholar 

  9. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology EUROCRYPT 99, ser. Lecture Notes in Computer Science, J. Stern, Ed. Springer Berlin Heidelberg, 1999, vol. 1592, pp.

  10. Sadikin M F, Kyas M. Efficient Security and Privacy Protection for Emerging Smart RFID Communications[J]. International Journal of Networked & Distributed Computing, 2014, 2(3):156.

    Google Scholar 

  11. Mokbel M F, Chow C Y, Aref W G. The new Casper: query processing for location services without compromising privacy[C]// International Conference on Very Large Data Bases, Seoul, Korea, September. DBLP, 2006:763–774.

  12. G. Ghinita, P. Kalnis, and S. Skiadopoulos, “Mobihide: a mobilea peerto-peer system for anonymous location-based queries,” in Advances in Spatial and Temporal Databases, 2007.

  13. Chow C Y et al, “Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments,” GeoInformatica, vol. 15, no. 2, pp. 351–380, 2011.

    Google Scholar 

  14. Duckham M, Kulik L. A Formal Model of Obfuscation and Negotiation for Location Privacy[J]. Lecture Notes in Computer Science, 2005, 3468:152–170.

    Google Scholar 

  15. C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. Di Vimercati, and P. Samarati, “Location privacy protection through obfuscation-based techniques,” in Data and Applications Security XXI, 2007.

  16. K. C. Lee, W.-C. Lee, H. V. Leong, and B. Zheng, “Navigational path privacy protection: navigational path privacy protection,” in CIKM, 2009.

  17. H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services,” in International Conference on Pervasive Services, 2005.

  18. P. Shankar et.al, “Privately querying location based services with sybilquery,” in International Conference on Ubiquitous Computing, 2009.

  19. M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in MobiSys, 2003.

  20. L. Sweeney, “k-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557–570, 2002.

    Google Scholar 

  21. Ishii N, Torii I, Nakashima T, et al. Generation and Mapping of Multi-Reducts Based on Nearest Neighbor Relation[J].International Journal of Networked & Distributed Computing, 2014, 2(1):1–10.

    Google Scholar 

  22. B. Gedik and L. Liu, “Protecting location privacy with personalized kanonymity: Architecture and algorithms,” IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1–18, 2008.

    Google Scholar 

  23. S. T. Peddinti, et al., “Cover locations: availing location-based services without revealing the location,” in WPES, 2011.

  24. M. Wernke, et al., “A classification of location privacy attacks and approaches,” Personal and Ubiquitous Computing, vol. 18, no. 1, pp. 163–175, 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Luoyang Electronic Equipment Test Center of China, No.17 Zhou Shan Street, 471003, Luoyang, China

    Chen Di, Li Hao & Zhou Shilei

  2. State Key Laboratory of Mathematical Engineering and Advanced Computing, No.62 Science Avenue, 450001, Zhengzhou, China

    Zhao Binglin

Authors
  1. Chen Di
    View author publications

    Search author on:PubMed Google Scholar

  2. Zhao Binglin
    View author publications

    Search author on:PubMed Google Scholar

  3. Li Hao
    View author publications

    Search author on:PubMed Google Scholar

  4. Zhou Shilei
    View author publications

    Search author on:PubMed Google Scholar

Corresponding author

Correspondence to Chen Di.

Rights and permissions

This is an open access article under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Di, C., Binglin, Z., Hao, L. et al. CSEP: Circular Shifting Encryption Protocols for Location Privacy Protection. Int J Netw Distrib Comput 5, 123–132 (2017). https://doi.org/10.2991/ijndc.2017.5.3.1

Download citation

  • Published: 03 July 2017

  • Issue date: July 2017

  • DOI: https://doi.org/10.2991/ijndc.2017.5.3.1

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • location based service
  • location privacy
  • range search
  • circular shifting encryption

Advertisement

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

Not affiliated

Springer Nature

© 2026 Springer Nature