JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Privacy Preserving Top-k Location-Based Service with Fully Homomorphic Encryption
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Privacy Preserving Top-k Location-Based Service with Fully Homomorphic Encryption
Hur, Miyoung; Lee, Younho;
  PDF(new window)
 Abstract
We propose a privacy-preserving location-based service (LBS) which supports top-k search service. The previous schemes hurt the privacy of either the user and the location of the objects because they are sent to the LBS server in a plaintext form. In the proposed method, by encrypting them with the fully-homomorphic encryption, we achieved the top-k search is possible while the information on them is not given to the LBS server. We performed a simulation on the proposed scheme with 16 locations where k is 3. The required time is 270 hours in a conventional desktop machine, which seems infeasible to be used in practice. However, as the progress of the hardware, the performance will be improved.
 Keywords
Privacy protection;Top-k search;Location based service;Security;
 Language
Korean
 Cited by
 References
1.
Nectaria Tryfona ,Dieter Pfoser. (2005). "Data Semantics in Location-based Services", Journal on Data Semantics III Lecture Notes in Computer Science Volume 3534, p. 168-195. crossref(new window)

2.
Dieter Pfoser and Nectaria Tryfona. (2009). "The Use of Ontologies in Location-based Services: The Space and Time Ontology in Protege", Research Academic Computer Technology Institute, Athens, Greece.

3.
Jaideep Vaidya and Chris Clifton. (2005). "Privacy-preserving top-k queries", In Proc. ICDE.

4.
Qian Chen, Haibo Hu, Jianliang Xu. (2013). "Authenticating top-k Queries in Location-based Services with Confidentiality", VLDB Endowment.

5.
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang. (2012). "Authenticating location-based services without compromising location privacy", In Proc. SIGMOD.

6.
T. Hashem and L. Kulik. (2011). "Don't trust anyone: Privacy protection for location-based services", Journal of Pervasive Mobile Computing, vol. 7, p.44-59. crossref(new window)

7.
Xiaoling Zhu, Yang Lu, Xiaojuan Zhu, Shuwei Qiu. (2013). "A Location Privacy-Preserving Protocol Based on Homomorphic Encryption and Key Agreement", IEEE.

8.
Shin, Kang Ju, Xiaoen Chen, Zhigang Hu, Xin. (2012). "Privacy protection for users of location-based services", IEEE wireless communications.

9.
Chi Lin, GuoweiWu1, Chang Wu Yu. (2014). "Protecting location privacy and query privacy a combinedclustering approach", Lin_et_al-2014-Concurrency_and_Computation-_Practice_and_Experience.

10.
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias. (2007). "Preventing Location-Based Identity Inference in Anonymous Spatial Queries", IEEE TKDE, 19(12):1719-1733.

11.
Sergey Yekhanin. (2010). "private information retrieval", Communications of the ACM, Volume 53, Issue 4, p. 68-73.

12.
Gabriel Ghinita, Panos Kalni, Ali Khoshgozara, Cyrus Shahab, Kian-Lee Ta. (2008). "Private queries in location based services: anonymizers are not necessary", SIGMOD '08 Proceedings of the 2008 ACM SIGMOD international conference on Management of data, p. 121-132.