Advertisement

Preserving Privacy in Location-Based Services Using Sudoku Structures

  • Sumitra Biswal
  • Goutam Paul
  • Shashwat Raizada
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8880)

Abstract

With the prevalence of ubiquitous computing and the increase in the number of mobile phone and smartphone users, multiple features and applications are being introduced to facilitate users’ daily life. However, users are unaware of the potential danger when the data is collected in return by the service providers. Users and the data associated with them are vulnerable to privacy attacks and threats. The concerning issue has been of interest to many researchers and several techniques have been proposed to counteract such threat and vulnerability issues. This paper proposes a new technique using Sudoku structures and shows how it can ensure users’ privacy and degrade the confidence level at the adversary’s end for tracking the user. In the proposed scheme, the service providers can be customized for varying needs of the user and in accordance with the types of queries. As a simple yet effective technique, it can create reasonable obfuscation for the adversary while guaranteeing accuracy of service for the users.

Keywords

Anonymity Location-Based Services Location Privacy Obfuscation Sudoku 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Murphy, S.: More SmartPhone Owners Use Location-Based Products [STUDY] (May 11, 2012), http://mashable.com/2012/05/11/location-based-services-study
  2. 2.
    Krumm, J.: Inference Attacks on Location Tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127–143. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  3. 3.
    Sweeney, L.: k-Anonymity: A model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)CrossRefzbMATHMathSciNetGoogle Scholar
  4. 4.
    Gedik, B., Liu, L.: Protecting Location Privacy and Personalized k-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing 7(1) (January 2008)Google Scholar
  5. 5.
    Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.-L.: Private queries in location based services: anonymizers are not necessary. In: ACM SIGMOD International Conference on Management of Data, pp. 121–132 (2008)Google Scholar
  6. 6.
    Khoshgozaran, A., Shahabi, C.: In Privacy in Location-Based Applications, pp. 59–83 (2009)Google Scholar
  7. 7.
    Raizada, S., Paul, G., Pandey, V.: Nearby-Friend Discovery Protocol for Multiple Users. In: International Conference on Computational Science and Engineering, vol. 3, pp. 238–243 (2009)Google Scholar
  8. 8.
    Shmatikov, V.: k-Anonymity and Other Cluster-Based Methods, https://www.cs.utexas.edu/~shmat/courses/cs380s_fall09/21kanon.ppt
  9. 9.
    Krumm, J.: A Survey of Computational Location Privacy. Personal and Ubiquitous Computing 13(6), 391–399 (2009)CrossRefGoogle Scholar
  10. 10.
    Fung, B.C.M., Wang, K., Fu, A.W.-C., Yu, P.S.: Introduction to Privacy-Preserving Data Publishing Concepts and Techniques. Series Editor: Kumar, V. (ed.) Chapman & Hall/CRC Data Mining and Knowledge Discovery SeriesGoogle Scholar
  11. 11.
    Mokbel, M.F.: Privacy-Preserving Location Services[Tutorial]. In: IEEE International Conference on Data Mining, IEEE ICDM 2008 (2008)Google Scholar
  12. 12.
    Beresford, A.R., Stajano, F.: Location Privacy in Pervasive Computing. IEEE Pervasive Computing 2(1), 46–55 (2003)CrossRefGoogle Scholar
  13. 13.
    Devaney, T.: Hackers grab private data from devices. In The Washington Times (September 05, 2012), http://www.equities.com/news/headline-story?dt=2012-09-06&val=454542&cat=finance
  14. 14.
    Zintl, E.: ‘Stingray’ Device Invades American Privacy (September 13, 2012), http://theminaretonline.com/2012/09/13/article23248
  15. 15.
    Kido, H., Yanagisawa, Y., Satoh, T.: An Anonymous Communication Technique using Dummies for Location-based Services. In: Second Int’l Conf. Pervasive Services (ICPS), pp. 88–97 (2005)Google Scholar
  16. 16.
    Newton, P.K., DeSalvo, S.A.: The Shannon entropy of Sudoku matrices. Proceedings of the Royal Society A 466(2119), 1957–1975 (2010)CrossRefzbMATHMathSciNetGoogle Scholar
  17. 17.
    Yato, T., Seta, T.: Complexity and Completeness of Finding Another Solution and Its Application to Puzzles. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E86-A(5), 1052–1060 (2003)Google Scholar
  18. 18.
    Gambs, S., Killijian, M.-O., del Prado Cortez, M.N.: Show Me How You Move and I Will Tell You Who You Are. Transactions on Data Privacy 4(2), 103–126 (2011)MathSciNetGoogle Scholar
  19. 19.
    Khoshgozaran, A., Shahabi, C.: Private Information Retrieval Techniques for enabling Location Privacy in Location-Based Services. In: Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.) Privacy in Location-Based Applications. LNCS, vol. 5599, pp. 59–83. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  20. 20.
    Shokri, R., Theodorakopoulos, G., Le Boudec, J.-Y., Hubaux, J.-P.: Quantifying Location Privacy. In: IEEE Symposium on Security and Privacy (SP), pp. 247–262 (May 2011)Google Scholar
  21. 21.
    Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.-P., Le Boudec, J.-Y.: Protecting location privacy: optimal strategy against localization attacks. In: ACM Conference on Computer and Communications Security (CCS), NY, USA, pp. 617–627 (2012)Google Scholar
  22. 22.
    Freudiger, J., Shokri, R., Hubaux, J.-P.: Evaluating the Privacy Risk of Location-Based Services. In: Danezis, G. (ed.) FC 2011. LNCS, vol. 7035, pp. 31–46. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  23. 23.
    Paganini, P.: Location services, Google is tracking your every move you make (August 24, 2014), http://securityaffairs.co/wordpress/27739/digital-id/location-services-track-you.html

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Sumitra Biswal
    • 1
  • Goutam Paul
    • 2
  • Shashwat Raizada
    • 3
  1. 1.Independent ResearcherNew DelhiIndia
  2. 2.Cryptology and Security Research Unit, R. C. Bose Centre for Cryptology & SecurityIndian Statistical InstituteKolkataIndia
  3. 3.Applied Statistics UnitIndian Statistical InstituteKolkataIndia

Personalised recommendations