This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Privacy-Preserving and Content-Protecting Location Based Queries
May 2014 (vol. 26 no. 5)
pp. 1-1
Elisa Bertino, Department of Computer Science and Cyber Center, Purdue University, West Lafayette, IN, USA
Md. Golam Kaosar, School of Engineering and Science, Victoria University, Melbourne, VIC, Australia
Xun Yi, School of Engineering and Science, Victoria University, Melbourne, VIC, Australia
Russell Paulet, School of Engineering and Science, Victoria University, Melbourne, VIC, Australia
In this paper we present a solution to one of the location-based query problems. This problem is defined as follows: (i) a user wants to query a database of location data, known as Points Of Interest (POIs), and does not want to reveal his/her location to the server due to privacy concerns; (ii) the owner of the location data, that is, the location server, does not want to simply distribute its data to all users. The location server desires to have some control over its data, since the data is its asset. We propose a major enhancement upon previous solutions by introducing a two stage approach, where the first step is based on Oblivious Transfer and the second step is based on Private Information Retrieval, to achieve a secure solution for both parties. The solution we present is efficient and practical in many scenarios. We implement our solution on a desktop machine and a mobile device to assess the efficiency of our protocol. We also introduce a security model and analyse the security in the context of our protocol. Finally, we highlight a security weakness of our previous work and present a solution to overcome it.
Index Terms:
Oblivious transfer,Location based query,Private query,Private information retrieval
Citation:
Elisa Bertino, Md. Golam Kaosar, Xun Yi, Russell Paulet, "Privacy-Preserving and Content-Protecting Location Based Queries," IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 5, pp. 1-1, May 2014, doi:10.1109/TKDE.2013.87
Usage of this product signifies your acceptance of the Terms of Use.