Skip to main content

Public Key Cryptosystem for Privacy Sensitive Location-Based Services

  • Conference paper
  • First Online:
Proceedings of International Symposium on Sensor Networks, Systems and Security (ISSNSS 2017)

Included in the following conference series:

  • 403 Accesses

Abstract

Almost every smartphone and wireless devices are equipped with GPS and other location-enabling technologies, which has enabled users to access location-based services, a popular service offered based on the user’s geographical location. In order to get a wide range of location-based services like locating nearby friends and locating nearby places/venues or public places (point of interest), users are forced to reveal their actual location; users are left with no option other than compromise location information causing privacy risk. In this paper, we revisited a protocol proposed by Muhammad N. Sakib and Chin-Tser Huang based on ECC concepts for proximity testing to preserve users location privacy. We made suitable modifications to the existing solution to overcome the false negatives in proximity testing and to reduce the unnecessary communication and computation cost. We have suggested an improvement to enable symmetric key exchange between communicating parties which can be used to securely share the location coordinates to calculate the actual distance between communicating parties. Our scheme withstands triangulation attacks and reveals no information about user’s exact location to either service providers or communicating parties or attackers, unless it is revealed by the user himself/herself.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Freni, D., Vicente, C.R., Mascetti, S., Bettini, C., Jensen, C.S.: Preserving location and absence privacy in geo-social networks. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management - CIKM ’10. ACM Press, New York (2010). https://doi.org/10.1145/1871437.1871480

  2. Hallgren, P., Ochoa, M., Sabelfeld, A.: InnerCircle: a parallelizable decentralized privacy-preserving location proximity protocol. In: 2015 13th Annual Conference on Privacy, Security and Trust (PST). IEEE, New York (2015). https://doi.org/10.1109/pst.2015.7232947

  3. Hankerson, D., Menezes, A.: Elliptic Curve Discrete Logarithm Problem, pp. 397–400. Springer, Boston (2011). https://doi.org/10.1007/978-1-4419-5906-5_246

  4. Magkos, E.: Cryptographic approaches for privacy preservation in location-based services: a survey. Int. J. Inf. Technol. Syst. Approach 4(2), 48–69 (2011). http://dx.doi.org/10.4018/jitsa.2011070104

  5. Mascetti, S., Freni, D., Bettini, C., Wang, X.S., Jajodia, S.: Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J. 20(4), 541–566 (2010). https://doi.org/10.1007/s00778-010-0213-7

  6. Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, CA, 6th February - 9th February 2011 (2011). http://www.isoc.org/isoc/conferences/ndss/11/pdf/1_3.pdf

  7. Sakib, M.N., Huang, C.T.: Privacy preserving proximity testing using elliptic curves. In: 2016 26th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, New York (2016). https://doi.org/10.1109/atnac.2016.7878794

  8. Šeděnka, J., Gasti, P.: Privacy-preserving distance computation and proximity testing on earth, done right. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’14, pp. 99–110. ACM, New York (2014). http://doi.acm.org/10.1145/2590296.2590307

  9. Šikšnys, L., Thomsen, J.R., Šaltenis, S., Yiu, M.L., Andersen, O.: A Location Privacy Aware Friend Locator, pp. 405–410. Springer, Berlin (2009). http://dx.doi.org/10.1007/978-3-642-02982-0_29

  10. Šikšnys, L., Thomsen, J.R., Šaltenis, S., Yiu, M.L.: Private and flexible proximity detection in mobile social networks. In: 2010 Eleventh International Conference on Mobile Data Management. IEEE, New York (2010). https://doi.org/10.1109/mdm.2010.43

  11. Talukder, N., Ahamed, S.I.: Preventing multi-query attack in location-based services. In: Proceedings of the Third ACM Conference on Wireless Network Security, WiSec ’10, pp. 25–36. ACM, New York (2010). http://doi.acm.org/10.1145/1741866.1741873

  12. Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three Protocols for Location Privacy, pp. 62–76. Springer, Berlin (2007). http://dx.doi.org/10.1007/978-3-540-75551-7_5

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mahesh Kumar, K.M., Sunitha, N.R. (2018). Public Key Cryptosystem for Privacy Sensitive Location-Based Services. In: Rao, N., Brooks, R., Wu, C. (eds) Proceedings of International Symposium on Sensor Networks, Systems and Security. ISSNSS 2017. Springer, Cham. https://doi.org/10.1007/978-3-319-75683-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75683-7_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75682-0

  • Online ISBN: 978-3-319-75683-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics