Skip to main content

Efficient Position Sharing for Location Privacy Using Binary Space Partitioning

  • Conference paper
Mobile and Ubiquitous Systems: Computing, Networking, and Services (MobiQuitous 2012)

Abstract

Millions of users use location-based applications (LBAs) to share their positions with friends, request information from points of interest finders, or get notifications from event finders, etc. Such LBAs are typically based on location servers (LSs) managing mobile object positions in a scalable fashion. However, storing precise user positions on LSs raises privacy concerns, in particular, if LS providers are non-trusted. To solve this problem, we present PShare-BSP, a novel approach for the secure management of private user positions on non-trusted LSs. PShare-BSP splits up precise user positions into position shares and distributes them to different LSs of different providers. Thus, a compromised provider only reveals user positions with degraded precision. Nevertheless, LBAs can combine several shares from different LSs to increase their precision.

PShare-BSP improves on our previous position sharing approaches [4,15,17]: It uses a deterministic share generation approach based on binary space partitioning to avoid probabilistic attacks based, for instance, on Monte Carlo simulations. Moreover, it significantly decreases the computational complexity and increases the efficiency by reducing the update costs for succeeding position updates.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bonatti, P.A., Samarati, P.: A uniform framework for regulating service access and information release on the web. Journal of Computer Security 10, 241–271 (2002)

    Article  Google Scholar 

  2. Damiani, M., Silvestri, C., Bertino, E.: Fine-grained cloaking of sensitive positions in location-sharing applications. Pervasive Computing 10, 64–72 (2011)

    Article  Google Scholar 

  3. DATALOSSDB (April 2012), http://www.datalossdb.org

  4. Dürr, F., Skvortsov, P., Rothermel, K.: Position sharing for location privacy in non-trusted systems. In: Proceedings of the 9th IEEE International Conference on Pervasive Computing and Communications, PerCom 2011 (2011)

    Google Scholar 

  5. Ghinita, G., Damiani, M.L., Silvestri, C., Bertino, E.: Preventing velocity-based linkage attacks in location-aware applications. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS 2009 (2009)

    Google Scholar 

  6. Gilbert, P., Cox, L.P., Jung, J., Wetherall, D.: Toward trustworthy mobile sensing. In: Proc. of the 11th Workshop on Mobile Computing Systems & Applications, HotMobile 2010 (2010)

    Google Scholar 

  7. Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering 19, 1719–1733 (2007)

    Article  Google Scholar 

  8. Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International Conference on Data Engineering, ICDE 2007 (2007)

    Google Scholar 

  9. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data 1, 3 (2007)

    Article  Google Scholar 

  10. Peddinti, S.T., Saxena, N.: On the limitations of query obfuscation techniques for location privacy. In: Proc. of the 13th Int. Conference on Ubiquitous Computing, UbiComp 2011 (2011)

    Google Scholar 

  11. PriLoc-Project (November 2012), http://www.PriLoc.de

  12. Shankar, P., Ganapathy, V., Iftode, L.: Privately querying location-based services with sybilquery. In: Proceedings of the 11th International Conference on Ubiquitous Computing, UbiComp 2009 (2009)

    Google Scholar 

  13. Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  14. Shokri, R., Theodorakopoulos, G., Le Boudec, J.-Y., Hubaux, J.-P.: Quantifying location privacy. In: Proc. of the 2011 IEEE Symposium on Security and Privacy, SP 2011 (2011)

    Google Scholar 

  15. Skvortsov, P., Dürr, F., Rothermel, K.: Map-aware position sharing for location privacy in non-trusted systems. In: Kay, J., Lukowicz, P., Tokuda, H., Olivier, P., Krüger, A. (eds.) Pervasive 2012. LNCS, vol. 7319, pp. 388–405. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  16. Talukder, N., Ahamed, S.I.: Preventing multi-query attack in location-based services. In: Proceedings of the 3rd ACM Conference on Wireless network security, WiSec 2010 (2010)

    Google Scholar 

  17. Wernke, M., Dürr, F., Rothermel, K.: PShare: position sharing for location privacy based on Multi-Secret sharing. In: Proceedings of the 10th IEEE International Conference on Pervasive Computing and Communications, PerCom 2012 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Wernke, M., Dürr, F., Rothermel, K. (2013). Efficient Position Sharing for Location Privacy Using Binary Space Partitioning. In: Zheng, K., Li, M., Jiang, H. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40238-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40238-8_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40237-1

  • Online ISBN: 978-3-642-40238-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics