Skip to main content

Selective Location Blinding Using Hash Chains

  • Conference paper
Book cover Security Protocols XIX (Security Protocols 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7114))

Included in the following conference series:

Abstract

Location-based applications require a user’s movements and positions to provide customized services. However, location is a sensitive piece of information that should not be revealed unless strictly necessary. In this paper we propose a procedure that allows a user to control the precision in which his location information is exposed to a service provider, while allowing his location to be certified by a location verifier. Our procedure makes use of a hash chain to certify the location information in such a way that the hashes of the chain correspond to an increasing level of precision.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Balasch, J., Rial, A., Troncoso, C., Geuens, C.: PrETP: Privacy-preserving electronic toll pricing. In: Proc. USENIX Security Symposium, pp. 63–78. USENIX (2010)

    Google Scholar 

  2. Cheng, R., Zhang, Y., Hwang, J., Prabhakar, S.: Preserving User Location Privacy in Mobile Data Management Infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 393–412. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Chow, C.-Y., Mokbel, M.F., Aref, W.G.: Casper ⋆ : Query processing for location services without compromising privacy. ACM Transactions on Database Systems 34(4), 1–48 (2009)

    Article  Google Scholar 

  4. Freudiger, J., Manshaei, M.H., Hubaux, J.P., Parkes, D.C.: On non-cooperative location privacy: a game-theoretic analysis. In: Proc. 16th ACM Conference on Computer and Communications Security, pp. 324–337. ACM Press (2009)

    Google Scholar 

  5. Graham, M., Gray, D.: Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol. In: Schmidt, A.U., Lian, S. (eds.) MobiSec 2009. LNICST, vol. 17, pp. 160–171. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. 1st Conference on Mobile Systems, Applications, and Services. USENIX (2003)

    Google Scholar 

  7. Harpes, C., Jager, B., Gent, B.: Secure localisation with location assurance provider. In: Proc. European Navigation Conference - Global Navigation Satellite Systems (2009)

    Google Scholar 

  8. Kalman, R.E.: A new approach to linear filtering and prediction problems. Journal of Basic Engineering 82(1), 35–45 (1960)

    Article  Google Scholar 

  9. Køien, G.M., Oleshchuk, V.A.: Location Privacy for Cellular Systems; Analysis and Solution. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 40–58. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Li, M., Sampigethaya, K., Huang, L., Poovendran, R.: Swing & swap: user-centric approaches towards maximizing location privacy. In: Proc. 5th ACM Workshop on Privacy in the Electronic Society, pp. 19–28. ACM Press (2006)

    Google Scholar 

  11. Popa, R.A., Balakrishnan, H., Blumberg, A.J.: VPriv: Protecting privacy in location-based vehicular services. In: Proc. USENIX Security Symposium, pp. 335–350. USENIX (2009)

    Google Scholar 

  12. Saroiu, S., Wolman, A.: Enabling new mobile applications with location proofs. In: Proc. 10th Workshop on Mobile Computing Systems and Applications. ACM Press (2009)

    Google Scholar 

  13. Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proc. ACM Workshop on Wireless Security, pp. 1–10. ACM Press (2003)

    Google Scholar 

  14. Warner, J.S., Johnston, R.G.: A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. Journal of Security Administration 25, 19–28 (2002)

    Google Scholar 

  15. Winterbottom, J., Thomson, M., Tschofenig, H.: GEOPRIV Presence Information Data Format Location Object (PIDF-LO) Usage Clarification, Considerations, and Recommendations. Tech. Rep. RFC 5491, IETF Network Working Group (March 2009)

    Google Scholar 

  16. Zhong, G., Hengartner, U.: Toward a distributed k-anonymity protocol for location privacy. In: Proc. 7th ACM Workshop on Privacy in the Electronic Society, pp. 33–38. ACM Press (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lenzini, G., Mauw, S., Pang, J. (2011). Selective Location Blinding Using Hash Chains. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds) Security Protocols XIX. Security Protocols 2011. Lecture Notes in Computer Science, vol 7114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25867-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25867-1_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25866-4

  • Online ISBN: 978-3-642-25867-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics