Privacy Preserving for Location-Based IoT Services

  • Yue QiuEmail author
  • Maode Ma
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 256)


In recent years, the applications of location-based Internet of Things (IoT) services change the way of people’s lives and works. However, these applications may disclose some private location information of users due to lack of privacy protection mechanism, which could result in serious security issues. To protect users’ confidential data, an efficient and secure private proximity testing (ESPT) scheme is designed for location-based IoT services to improve the efficiency while maintaining the privacy of the location of the users. The proposed scheme enables a user to query a service provider whether some people are within a given search range without disclosing any private location information of the user. The security analysis and the simulation results demonstrate that the proposed scheme could not only implement a privacy-preserving proximity test, but also has less computational overheads.


Bloom filter Location privacy Proximity testing Security 



We appreciate the financial support from Ministry of Education, Singapore through the Academic Research Fund (AcRF) Tier 1 for the project of RG20/15.


  1. 1.
    Prigg, M.: Privacy warning over app that can track your location even if you turn GPS off on your phone. Accessed 10 Dec 2017
  2. 2.
    Chong, Z.: Obike becomes latest victim of global data breach. Accessed 12 Dec 2017
  3. 3.
    Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Proceedings of NDSS 2011 (2011)Google Scholar
  4. 4.
    Saldamli, G., Chow, R., Jin, H., Knijnenburg, B.P.: Private proximity testing with an untrusted server. In: Proceedings of 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2013, WISEC 2013, pp. 113–118. ACM (2013)Google Scholar
  5. 5.
    Zhuo, G., Jia, Q., Guo, L., Li, M., Fang, Y.: Privacy-preserving verifiable proximity test for location-based services. In: Proceedings of IEEE Global Communications Conference 2015 (GLOBECOM 2015), pp. 1–6. IEEE, USA (2015)Google Scholar
  6. 6.
    Novak, E., Li, Q.: Near-PRI: private, proximity based location sharing. In: Proceedings of IEEE INFOCOM 2014, pp. 37–45. IEEE, Canada (2014)Google Scholar
  7. 7.
    Huang, C., Lu, R., Zhu, H., Shao, J., Alamer, A., Lin, X.: EPPD: efficient and privacy-preserving proximity testing with differential privacy techniques. In: Proceedings of IEEE International Conference on Communications 2016 (ICC 2016), pp. 1–6. EEE, Malaysia (2016)Google Scholar
  8. 8.
    Zheng, Y., Li, M., Lou, W., Hou, Y.T.: SHARP: private proximity test and secure handshake with cheat-proof location tags. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 361–378. Springer, Heidelberg (2012). Scholar
  9. 9.
    Zheng, Y., Li, M., Lou, W., Hou, Y.T.: Location based handshake and private proximity test with location tags. IEEE Trans. Dependable Secure Comput. 14(4), 406–419 (2017)CrossRefGoogle Scholar
  10. 10.
    Sedenka, J., Gasti, P.: Privacy-preserving distance computation and proximity testing on earth, done right. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security 2014 (ASIA CCS 2014), pp. 99–110 (2014)Google Scholar
  11. 11.
    Andr´es, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS 2013), pp. 901–914 (2013)Google Scholar
  12. 12.
    Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704–719 (2016)Google Scholar
  13. 13.
    Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4), 46–50 (2014)CrossRefGoogle Scholar
  14. 14.
    The AVISPA Team: AVISPA v1.1 User Manual. Accessed 21 Aug 2017
  15. 15.
    Viganò, L.: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theoret. Comput. Sci. 155, 61–86 (2006)CrossRefGoogle Scholar
  16. 16.
    Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)MathSciNetCrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.School of Electrical and Electronic EngineeringNanyang Technological UniversitySingaporeSingapore

Personalised recommendations