Javascript must be enabled to continue!
Exploring Privacy in Location-based Services Using Cryptographic Protocols
View through CrossRef
Location-based services (LBS) are available on a variety of mobile platforms like cell phones, PDA's, etc. and an increasing number of users subscribe to and use these services. Two of the popular models of information flow in LBS are the client-server model and the peer-to-peer model, in both of which, existing approaches do not always provide privacy for all parties concerned. In this work, I study the feasibility of applying cryptographic protocols to design privacy-preserving solutions for LBS from an experimental and theoretical standpoint. In the client-server model, I construct a two-phase framework for processing nearest neighbor queries using combinations of cryptographic protocols such as oblivious transfer and private information retrieval. In the peer-to-peer model, I present privacy preserving solutions for processing group nearest neighbor queries in the semi-honest and dishonest adversarial models. I apply concepts from secure multi-party computation to realize our constructions and also leverage the capabilities of trusted computing technology, specifically TPM chips. My solution for the dishonest adversarial model is also of independent cryptographic interest. I prove my constructions secure under standard cryptographic assumptions and design experiments for testing the feasibility or practicability of our constructions and benchmark key operations. My experiments show that the proposed constructions are practical to implement and have reasonable costs, while providing strong privacy assurances.
Title: Exploring Privacy in Location-based Services Using Cryptographic Protocols
Description:
Location-based services (LBS) are available on a variety of mobile platforms like cell phones, PDA's, etc.
and an increasing number of users subscribe to and use these services.
Two of the popular models of information flow in LBS are the client-server model and the peer-to-peer model, in both of which, existing approaches do not always provide privacy for all parties concerned.
In this work, I study the feasibility of applying cryptographic protocols to design privacy-preserving solutions for LBS from an experimental and theoretical standpoint.
In the client-server model, I construct a two-phase framework for processing nearest neighbor queries using combinations of cryptographic protocols such as oblivious transfer and private information retrieval.
In the peer-to-peer model, I present privacy preserving solutions for processing group nearest neighbor queries in the semi-honest and dishonest adversarial models.
I apply concepts from secure multi-party computation to realize our constructions and also leverage the capabilities of trusted computing technology, specifically TPM chips.
My solution for the dishonest adversarial model is also of independent cryptographic interest.
I prove my constructions secure under standard cryptographic assumptions and design experiments for testing the feasibility or practicability of our constructions and benchmark key operations.
My experiments show that the proposed constructions are practical to implement and have reasonable costs, while providing strong privacy assurances.
Related Results
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Optimizing IETF multimedia signaling protocols and architectures in 3GPP networks : an evolutionary approach
Signaling in Next Generation IP-based networks heavily relies in the family of multimedia signaling protocols defined by IETF. Two of these signaling protocols are RTSP and SIP, wh...
Augmented Differential Privacy Framework for Data Analytics
Augmented Differential Privacy Framework for Data Analytics
Abstract
Differential privacy has emerged as a popular privacy framework for providing privacy preserving noisy query answers based on statistical properties of databases. ...
Privacy Risk in Recommender Systems
Privacy Risk in Recommender Systems
Nowadays, recommender systems are mostly used in many online applications to filter information and help users in selecting their relevant requirements. It avoids users to become o...
Stability Control of Position Flow Fuzzy Estimation in Swarm Intelligence Aware Privacy Protection
Stability Control of Position Flow Fuzzy Estimation in Swarm Intelligence Aware Privacy Protection
The group intelligence perception privacy protection model is a method to achieve the balance between user privacy and service requests through the cooperation between users using ...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
SoK: Secure E-Voting with Everlasting Privacy
SoK: Secure E-Voting with Everlasting Privacy
Vote privacy is a fundamental right, which needs to be protected not only during an election, or for a limited time afterwards, but for the foreseeable future. Numerous electronic ...
Privacy in online advertising platforms
Privacy in online advertising platforms
Online advertising is consistently considered as the pillar of the "free⢠content on the Web since it is commonly the funding source of websites. Furthermore, the option of deliver...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...

