Location Oblivious Privacy Protection for Group Nearest Neighbor Queries

  • A. K. M. Mustafizur Rahman Khan
  • Tanzima Hashem
  • Egemen Tanin
  • Lars Kulik
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8728)


Finding a convenient meeting point for a group is a common problem. For example, a group of users may want to meet at a restaurant that minimizes the group’s total travel distance. Such queries are called Group Nearest Neighbor (GNN) queries. Up to now, users have had to rely on an external party, typically a location service provider (LSP), for computing an optimal meeting point. This implies that users have to trust the LSP with their private locations. Existing techniques for private GNN queries either cannot resist sophisticated attacks or are computationally too expensive to be implemented on the popular platform of mobile phones. This paper proposes an algorithm to efficiently process private GNN queries. To achieve high efficiency we propose an approach that approximates a GNN with a high accuracy and is robust to attacks. Unlike methods based on obfuscation, our method does not require a user to provide an imprecise location and is in fact location oblivious. Our approach is based on a distributed secure sum protocol which requires only light weight computation. Our experimental results show that we provide a readily deployable solution for real life applications which can also be deployed for other geo-spatial queries and applications.


Location Privacy Privacy Preserve Malicious User Homomorphic Encryption Oblivious Transfer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys, pp. 31–42 (2003)Google Scholar
  2. 2.
    Chow, C.Y., Mokbel, M.F., Liu, X.: A peer-to- peer spatial cloaking algorithm for anonymous location based service. In: ACMGIS, pp. 171–178 (2006)Google Scholar
  3. 3.
    Hashem, T., Kulik, L., Zhang, R.: Privacy preserving group nearest neighbor queries. In: EDBT, pp. 489–500 (2010)Google Scholar
  4. 4.
    Duckham, M., Kulik, L., Birtley, A.: A spatiotemporal model of strategies and counter strategies for location privacy protection. In: Raubal, M., Miller, H.J., Frank, A.U., Goodchild, M.F. (eds.) GIScience 2006. LNCS, vol. 4197, pp. 47–64. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  5. 5.
    Shokri, R., Freudiger, J., Hubaux, J.P.: A unified framework for location privacy. In: HotPETs (2010)Google Scholar
  6. 6.
    Ashouri-Talouki, M., Baraani-Dastjerdi, A., Aydın Selçuk, A.: GLP: A cryptographic approach for group location privacy. Computer Communications 35(12), 1527–1533 (2012)CrossRefGoogle Scholar
  7. 7.
    Huang, Y., Vishwanathan, R.: Privacy preserving group nearest neighbour queries in location-based services using cryptographic techniques. In: IEEE GLOBECOM, pp. 1–5 (2010)Google Scholar
  8. 8.
    Sheikh, R., Kumar, B., Mishra, D.: A distributed k-secure sum protocol for secure multi-party computations. Journal of Computing 2(3), 68–72 (2010)Google Scholar
  9. 9.
    Papadias, D., Shen, Q., Tao, Y., Mouratidis, K.: Group nearest neighbor queries. In: ICDE, pp. 301–312 (2004)Google Scholar
  10. 10.
    Ashouri-Talouki, M., Baraani-Dastjerdi, A.: Homomorphic encryption to preserve location privacy. International Journal of Security and Its Applications 6(4), 183–189 (2012)Google Scholar
  11. 11.
    Huang, Y., Chapman, P., Evans, D.: Privacy preserving applications on smartphones. In: USENIX Workshop on Hot Topics in Security, p. 4 (2011)Google Scholar
  12. 12.
    Mood, B., Letaw, L., Butler, K.: Memory efficient garbled circuit generation for mobile devices. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 254–268. Springer, Heidelberg (2012)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • A. K. M. Mustafizur Rahman Khan
    • 1
  • Tanzima Hashem
    • 2
  • Egemen Tanin
    • 1
  • Lars Kulik
    • 1
  1. 1.University of MelbourneVictoriaAustralia
  2. 2.Bangladesh University of Engineering & TechnologyDhakaBangladesh

Personalised recommendations