Skip to main content

Privacy in Mobile Computing for Location-Sharing-Based Services

  • Conference paper
Privacy Enhancing Technologies (PETS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6794))

Included in the following conference series:

Abstract

Location-Sharing-Based Services (LSBS) complement Location-Based Services by using locations from a group of users, and not just individuals, to provide some contextualized service based on the locations in the group. However, there are growing concerns about the misuse of location data by third-parties, which fuels the need for more privacy controls in such services. We address the relevant problem of privacy in LSBSs by providing practical and effective solutions to the privacy problem in one such service, namely the fair rendez-vous point (FRVP) determination service. The privacy preserving FRVP (PPFRVP) problem is general enough and nicely captures the computations and privacy requirements in LSBSs. In this paper, we propose two privacy-preserving algorithms for the FRVP problem and analytically evaluate their privacy in both passive and active adversarial scenarios. We study the practical feasibility and performance of the proposed approaches by implementing them on Nokia mobile devices. By means of a targeted user-study, we attempt to gain further understanding of the popularity, the privacy and acceptance of the proposed solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Berger, F., Klein, R., Nussbaum, D., Sack, J.-R., Yi, J.: A meeting scheduling problem respecting time and space. GeoInformatica (2009)

    Google Scholar 

  2. Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Cachin, C., Strobl, R.: Asynchronous group key exchange with failures. In: ACM PODC 2004 (2004)

    Google Scholar 

  4. Chen, C.-H.O., Chen, C.-W., Kuo, C., Lai, Y.-H., McCune, J.M., Studer, A., Perrig, A., Yang, B.-Y., Wu, T.-C.: Gangs: Gather, authenticate ’n group securely. In: ACM MobiCom 2008 (2008)

    Google Scholar 

  5. Chignell, M., Quan-Haase, A., Gwizdka, J.: The privacy attitudes questionnaire (paq): initial development and validation. In: Human Factors and Ergonomics Society Annual Meeting Proceedings (2003)

    Google Scholar 

  6. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31 (1985)

    Google Scholar 

  7. Facebook Deals, http://www.facebook.com/deals/

  8. Facebook Statistics, http://www.facebook.com/press/info.php?statistics

  9. Foursquare for Business, http://foursquare.com/business/ (last visited February 04, 2011)

  10. Frikken, K.B., Atallah, M.J.: Privacy preserving route planning. In: WPES 2004 (2004)

    Google Scholar 

  11. Goldreich, O.: Foundations of cryptography: Basic applications. Cambridge University Press, Cambridge (2004)

    MATH  Google Scholar 

  12. Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing 13(6), 391–399 (2009)

    Article  Google Scholar 

  13. Lewis, J.: IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. International Journal of Human-Computer Interaction 7 (1995)

    Google Scholar 

  14. Li, S.-D., Dai, Y.-Q.: Secure two-party computational geometry. Journal of Computer Science and Technology 20 (2005)

    Google Scholar 

  15. Lin, Y.-H., Studer, A., Hsiao, H.-C., McCune, J.M., Wang, K.-H., Krohn, M., Lin, P.-L., Perrig, A., Sun, H.-M., Yang, B.-Y.: Spate: Small-group PKI-less authenticated trust establishment. In: MobiSys 2009 (2009)

    Google Scholar 

  16. MeetWays, http://www.meetways.com/

  17. Mezzoman, http://www.mezzoman.com/

  18. Microsoft survey on LBS (2011), http://go.microsoft.com/?linkid=9758039

  19. Orange Taxi sharing app, http://event.orange.com/default/EN/all/mondial_auto_en/taxi_partage.htm

  20. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)

    Google Scholar 

  21. Please Rob Me, http://pleaserobme.com/

  22. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978)

    Google Scholar 

  23. Robshaw, M., Yin, Y.: Elliptic curve cryptosystems. An RSA Laboratories Technical Note (1997)

    Google Scholar 

  24. Santos, P., Vaughn, H.: Where shall we meet? Proposing optimal locations for meetings. In: MapISNet 2007 (2007)

    Google Scholar 

  25. Schoenmakers, B.: A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 148. Springer, Heidelberg (1999)

    Google Scholar 

  26. Solanas, A., Martínez-Ballesté, A.: Privacy protection in location-based services through a public-key privacy homomorphism. In: Public Key Infrastructure (2007)

    Google Scholar 

  27. UTM coordinate system, https://www.e-education.psu.edu/natureofgeoinfo/c2_p21.html

  28. Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy. In: Privacy Enhancing Technologies, pp. 62–76 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bilogrevic, I., Jadliwala, M., Kalkan, K., Hubaux, JP., Aad, I. (2011). Privacy in Mobile Computing for Location-Sharing-Based Services. In: Fischer-Hübner, S., Hopper, N. (eds) Privacy Enhancing Technologies. PETS 2011. Lecture Notes in Computer Science, vol 6794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22263-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22263-4_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22262-7

  • Online ISBN: 978-3-642-22263-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics