Abstract
Mobile smartphone users frequently need to search for nearby points of interest from a location based service, but in a way that preserves the privacy of the users’ locations. We present a technique for private information retrieval that allows a user to retrieve information from a database server without revealing what is actually being retrieved from the server. We perform the retrieval operation in a computationally efficient manner to make it practical for resource-constrained hardware such as smartphones, which have limited processing power, memory, and wireless bandwidth. In particular, our algorithm makes use of a variable-sized cloaking region that increases the location privacy of the user at the cost of additional computation, but maintains the same traffic cost. Our proposal does not require the use of a trusted third-party component, and ensures that we find a good compromise between user privacy and computational efficiency. We evaluated our approach with a proof-of-concept implementation over a commercial-grade database of points of interest. We also measured the performance of our query technique on a smartphone and wireless network.
An extended version of this paper is available [27].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ali Khoshgozaran, H.S.-M., Shahabi, C.: SPIRAL, a scalable private information retrieval approach to location privacy. In: Proceedings of the 2nd International Workshop on Privacy-Aware Location-based Mobile Services, PALMS (2008)
Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: Proceeding of the 17th international conference on World Wide Web, New York, NY, USA, pp. 237–246 (2008)
Beimel, A., Stahl, Y.: Robust information-theoretic private information retrieval. J. Cryptol. 20(3), 295–321 (2007)
Bettini, C., Jajodia, S., Samarati, P., Wang, X.S. (eds.): Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9. CEUR Workshop Proceedings, vol. 397 (2008)
Chor, B., Gilboa, N.: Computationally private information retrieval (extended abstract). In: STOC 1997: Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, New York, NY, USA, pp. 304–313 (1997)
Chor, B., Gilboa, N., Naor, M.: Private information retrieval by keywords. Technical Report TR CS0917, Dept. of Computer Science, Technion, Israel (1997)
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the 36th Annual Symposium on the Foundations of Computer Science, October 1995, pp. 41–50 (1995)
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965–981 (1998)
Chow, C., Mokbel, M.F., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In: Proceedings of the 14th Annual ACM international Symposium on Advances in Geographic information Systems, New York, NY, USA, pp. 171–178 (2006)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: SSYM 2004: Proceedings of the 13th conference on USENIX Security Symposium, Berkeley, CA, USA, pp. 21–21 (2004)
Ghinita, G.: Understanding the privacy-efficiency trade-off in location based queries. In: SPRINGL 2008: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, New York, NY, USA, pp. 1–5 (2008)
Ghinita, G., Kalnis, P., Kantarcioglu, M., Bertino, E.: A hybrid technique for private location-based queries with database protection. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds.) SSTD 2009. LNCS, vol. 5644, pp. 98–116. Springer, Heidelberg (2009)
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.-L.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD 2008: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, New York, NY, USA, pp. 121–132 (2008)
Goldberg, I.: Percy++ project on SourceForge, http://percy.sourceforge.net/
Goldberg, I.: Improving the robustness of private information retrieval. In: SP 2007: Proceedings of the 2007 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 131–148 (2007)
GPSmagazine. Garmin nuvi 780 GPS Review, http://gpsmagazine.com
GPSreview.net. POI– Points of Interest, http://www.gpsreview.net/pois/
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003: Proceedings of the 1st international conference on Mobile systems, applications and services, New York, NY, USA, pp. 31–42 (2003)
Hengartner, U.: Hiding location information from location-based services. In: 2007 International Conference on Mobile Data Management, May 2007, pp. 268–272 (2007)
Iliev, A., Smith, S.W.: Protecting Client Privacy with Trusted Computing at the Server. IEEE Security and Privacy 3(2), 20–28 (2005)
Kennedy, M., Kopp, S.: Understanding Map Projections. ESRI (Environmental Systems Research Institute) press (2000)
Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: FOCS 1997: Proceedings of the 38th Annual Symposium on Foundations of Computer Science, Washington, DC, USA, p. 364 (1997)
Lin, D., Bertino, E., Cheng, R., Prabhakar, S.: Position transformation: a location privacy protection method for moving objects. In: SPRINGL 2008: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, New York, NY, USA, pp. 62–71 (2008)
Mishra, S.K., Sarkar, P.: Symmetrically private information retrieval. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 225–236. Springer, Heidelberg (2000)
Mokbel, M.F., Chow, C.-Y., Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: VLDB 2006: Proceedings of the 32nd international conference on Very large data bases, pp. 763–774 (2006)
Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: STOC 1999: Proceedings of the thirty-first annual ACM symposium on Theory of computing, New York, NY, USA, pp. 245–254 (1999)
Olumofin, F., Tysowski, P.K., Goldberg, I., Hengartner, U.: Achieving Efficient Query Privacy for Location Based Services. Technical report, CACR 2009-22, University of Waterloo (2009)
Pingley, A., Yu, W., Zhang, N., Fu, X., Zhao, W.: CAP: A Context-Aware Privacy Protection System For Location-Based Services. In: 29th IEEE International Conference on Distributed Computing Systems (June 2009)
Riboni, D., Pareschi, L., Bettini, C.: Privacy in georeferenced context-aware services: A survey. In: Bettini, et al. (eds.) [4]
Saint-Jean, F.: Java implementation of a single-database computationally symmetric private information retrieval (CSPIR) protocol. Technical Report YALEU/DCS/TR-1333A, Yale University, New Haven, CT, USA (2005)
Sion, R., Carbunar, B.: On the computational practicality of private information retrieval. In: Proceedings of the Network and Distributed Systems Security Symposium (2007)
Snyder, J.P.: Flattening the Earth, two thousand years of map projections. University of Chicago Press, Chicago (1993)
Solanas, A., Domingo-Ferrer, J., MartĂnez-BallestĂ©, A.: Location privacy in location-based services: Beyond TTP-based schemes. In: Bettini, et al. (eds.) [4]
Xu, T., Cai, Y.: Location anonymity in continuous location-based services. In: Proceedings of the 15th Annual ACM international Symposium on Advances in Geographic information Systems, New York, NY, USA, pp. 1–8 (2007)
Zhong, G., Hengartner, U.: A distributed k-anonymity protocol for location privacy. In: Proceedings of Seventh IEEE International Conference on Pervasive Computing and Communication (PerCom 2009), Galveston, TX, pp. 253–262 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Olumofin, F., Tysowski, P.K., Goldberg, I., Hengartner, U. (2010). Achieving Efficient Query Privacy for Location Based Services. In: Atallah, M.J., Hopper, N.J. (eds) Privacy Enhancing Technologies. PETS 2010. Lecture Notes in Computer Science, vol 6205. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14527-8_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-14527-8_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14526-1
Online ISBN: 978-3-642-14527-8
eBook Packages: Computer ScienceComputer Science (R0)