Abstract
Location Based Service (LBS) is gaining popularity. As one fundamental LBS service, range search returns all Point of Interests (POIs) within a user-specified range. However, people leave their location privacy at risks when using range search. How to provide a high-quality range search service while protecting users’ location privacy is a challenging problem. Most existing approaches use space-filling curves and cloaked region method to provide privacy-preservation location services, but these methods cannot return the accurate results. In this paper, we propose a set of Circular Shifting Encryption Protocols (CSEP) based on homomorphism and circular shift for location privacy protection of range search. CSEP leverages homomorphism encryption to encrypt users’ locations, and LBS servers compute distances on cyphertext. In this way, LBS server can return POIs within the specified range, while learning nothing about the user’s real location. To accommodate the different query range and the private protection degree of users, we propose a circular shifting encryption method to reduce the redundancy and increase the degree of privacy protection. We implement a prototype of CSEP, and evaluate it with real POI set of a large-scale production LBS. Experimental results show that CSEP can provide reliable privacy protection and accurate range search, with reasonable compute overhead and communication overhead.
Article PDF
Similar content being viewed by others
References
S.B.Wicker, “The loss of location privacy in the cellularage,” Commun.ACM, vol. 55, no. 8, pp. 60–68, Aug.2012.[Online].Available:http://doi.acm.org/10.1145/2240236.2240255
Niu B, Li Q, Zhu X, et al. Achieving k-anonymity in privacy-aware location-based services[C]// IEEE INFOCOM 2014 - IEEE Conference on Computer Communications. IEEE, 2014:754–762.
Zhangwei H, Mingjun X. A Distributed Spatial Cloaking Protocol for Location Privacy[C]// Second International Conference on Networks Security Wireless Communications and Trusted Computing. IEEE, 2010:468–471.
M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu, “Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services,” in ICDE, 2008.
Bamba B, Liu L, Pesti P, et al. Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid[C]// International Conference on World Wide Web. ACM, 2008:237–246.
G.Ghinita, P.Kalnis, A.Khoshgozaran, C.Shahabi, and K.-L.Tan, “Private queries in location based services: anonymizers are not necessary.” In International Comference on Management of Data, 2008
A. Khoshgozaran and C. Shahabi, “Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy,” in Advances in Spatial and Temporal Databases, 2007.
Ghinita G. Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy[J]. Transactions on Data Privacy, 2009, 2(1):3–19.
P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology EUROCRYPT 99, ser. Lecture Notes in Computer Science, J. Stern, Ed. Springer Berlin Heidelberg, 1999, vol. 1592, pp.
Sadikin M F, Kyas M. Efficient Security and Privacy Protection for Emerging Smart RFID Communications[J]. International Journal of Networked & Distributed Computing, 2014, 2(3):156.
Mokbel M F, Chow C Y, Aref W G. The new Casper: query processing for location services without compromising privacy[C]// International Conference on Very Large Data Bases, Seoul, Korea, September. DBLP, 2006:763–774.
G. Ghinita, P. Kalnis, and S. Skiadopoulos, “Mobihide: a mobilea peerto-peer system for anonymous location-based queries,” in Advances in Spatial and Temporal Databases, 2007.
Chow C Y et al, “Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments,” GeoInformatica, vol. 15, no. 2, pp. 351–380, 2011.
Duckham M, Kulik L. A Formal Model of Obfuscation and Negotiation for Location Privacy[J]. Lecture Notes in Computer Science, 2005, 3468:152–170.
C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. Di Vimercati, and P. Samarati, “Location privacy protection through obfuscation-based techniques,” in Data and Applications Security XXI, 2007.
K. C. Lee, W.-C. Lee, H. V. Leong, and B. Zheng, “Navigational path privacy protection: navigational path privacy protection,” in CIKM, 2009.
H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services,” in International Conference on Pervasive Services, 2005.
P. Shankar et.al, “Privately querying location based services with sybilquery,” in International Conference on Ubiquitous Computing, 2009.
M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in MobiSys, 2003.
L. Sweeney, “k-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557–570, 2002.
Ishii N, Torii I, Nakashima T, et al. Generation and Mapping of Multi-Reducts Based on Nearest Neighbor Relation[J].International Journal of Networked & Distributed Computing, 2014, 2(1):1–10.
B. Gedik and L. Liu, “Protecting location privacy with personalized kanonymity: Architecture and algorithms,” IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1–18, 2008.
S. T. Peddinti, et al., “Cover locations: availing location-based services without revealing the location,” in WPES, 2011.
M. Wernke, et al., “A classification of location privacy attacks and approaches,” Personal and Ubiquitous Computing, vol. 18, no. 1, pp. 163–175, 2014.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Di, C., Binglin, Z., Hao, L. et al. CSEP: Circular Shifting Encryption Protocols for Location Privacy Protection. Int J Netw Distrib Comput 5, 123–132 (2017). https://doi.org/10.2991/ijndc.2017.5.3.1
Published:
Issue date:
DOI: https://doi.org/10.2991/ijndc.2017.5.3.1