Abstract
Location-Sharing-Based Services (LSBS) complement Location-Based Services by using locations from a group of users, and not just individuals, to provide some contextualized service based on the locations in the group. However, there are growing concerns about the misuse of location data by third-parties, which fuels the need for more privacy controls in such services. We address the relevant problem of privacy in LSBSs by providing practical and effective solutions to the privacy problem in one such service, namely the fair rendez-vous point (FRVP) determination service. The privacy preserving FRVP (PPFRVP) problem is general enough and nicely captures the computations and privacy requirements in LSBSs. In this paper, we propose two privacy-preserving algorithms for the FRVP problem and analytically evaluate their privacy in both passive and active adversarial scenarios. We study the practical feasibility and performance of the proposed approaches by implementing them on Nokia mobile devices. By means of a targeted user-study, we attempt to gain further understanding of the popularity, the privacy and acceptance of the proposed solutions.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Berger, F., Klein, R., Nussbaum, D., Sack, J.-R., Yi, J.: A meeting scheduling problem respecting time and space. GeoInformatica (2009)
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005)
Cachin, C., Strobl, R.: Asynchronous group key exchange with failures. In: ACM PODC 2004 (2004)
Chen, C.-H.O., Chen, C.-W., Kuo, C., Lai, Y.-H., McCune, J.M., Studer, A., Perrig, A., Yang, B.-Y., Wu, T.-C.: Gangs: Gather, authenticate ’n group securely. In: ACM MobiCom 2008 (2008)
Chignell, M., Quan-Haase, A., Gwizdka, J.: The privacy attitudes questionnaire (paq): initial development and validation. In: Human Factors and Ergonomics Society Annual Meeting Proceedings (2003)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31 (1985)
Facebook Deals, http://www.facebook.com/deals/
Facebook Statistics, http://www.facebook.com/press/info.php?statistics
Foursquare for Business, http://foursquare.com/business/ (last visited February 04, 2011)
Frikken, K.B., Atallah, M.J.: Privacy preserving route planning. In: WPES 2004 (2004)
Goldreich, O.: Foundations of cryptography: Basic applications. Cambridge University Press, Cambridge (2004)
Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing 13(6), 391–399 (2009)
Lewis, J.: IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. International Journal of Human-Computer Interaction 7 (1995)
Li, S.-D., Dai, Y.-Q.: Secure two-party computational geometry. Journal of Computer Science and Technology 20 (2005)
Lin, Y.-H., Studer, A., Hsiao, H.-C., McCune, J.M., Wang, K.-H., Krohn, M., Lin, P.-L., Perrig, A., Sun, H.-M., Yang, B.-Y.: Spate: Small-group PKI-less authenticated trust establishment. In: MobiSys 2009 (2009)
MeetWays, http://www.meetways.com/
Mezzoman, http://www.mezzoman.com/
Microsoft survey on LBS (2011), http://go.microsoft.com/?linkid=9758039
Orange Taxi sharing app, http://event.orange.com/default/EN/all/mondial_auto_en/taxi_partage.htm
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)
Please Rob Me, http://pleaserobme.com/
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978)
Robshaw, M., Yin, Y.: Elliptic curve cryptosystems. An RSA Laboratories Technical Note (1997)
Santos, P., Vaughn, H.: Where shall we meet? Proposing optimal locations for meetings. In: MapISNet 2007 (2007)
Schoenmakers, B.: A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 148. Springer, Heidelberg (1999)
Solanas, A., Martínez-Ballesté, A.: Privacy protection in location-based services through a public-key privacy homomorphism. In: Public Key Infrastructure (2007)
UTM coordinate system, https://www.e-education.psu.edu/natureofgeoinfo/c2_p21.html
Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy. In: Privacy Enhancing Technologies, pp. 62–76 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bilogrevic, I., Jadliwala, M., Kalkan, K., Hubaux, JP., Aad, I. (2011). Privacy in Mobile Computing for Location-Sharing-Based Services. In: Fischer-Hübner, S., Hopper, N. (eds) Privacy Enhancing Technologies. PETS 2011. Lecture Notes in Computer Science, vol 6794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22263-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-22263-4_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22262-7
Online ISBN: 978-3-642-22263-4
eBook Packages: Computer ScienceComputer Science (R0)