Institutional Repository

The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services

Show simple item record Ashouri-Talouki, Maede Baraani-Dastjerdi, Ahmad Selçuk, Ali Aydın 2019-06-26T07:40:34Z 2019-06-26T07:40:34Z 2015-12
dc.identifier.citation Ashouri-Talouki, M., Baraani-Dastjerdi, A., & Selçuk, A. A. (2015). The cloaked-centroid protocol: location privacy protection for a group of users of location-based services. Knowledge and Information Systems, 45(3), 589-615. en_US
dc.identifier.issn 0219-1377
dc.description.abstract Several techniques have been recently proposed to protect user location privacy while accessing location-based services (LBSs). However, applying these techniques to protect location privacy for a group of users would lead to user privacy leakage and query inefficiency. In this paper, we propose a two-phase protocol, we name Cloaked-Centroid, which is designed specifically to protect location privacy for a group of users. We identify location privacy issues for a group of users who may ask an LBS for a meeting place that is closest to the group centroid. Our protocol relies on spatial cloaking, an anonymous veto network and a conference key establishment protocol. In the first phase, member locations are cloaked into a single region based on their privacy profiles, and then, a single query is submitted to an LBS. In the second phase, a special secure multiparty computation extracts the meeting point result from the received answer set. Our protocol is resource aware, taking into account the LBS overhead and the communication cost, i.e., the number of nearest neighbor queries sent to a service provider and the number of returned points of interests. Regarding privacy, Cloaked-Centroid protects the location privacy of each group member from those in the group and from anyone outside the group, including the LBS. Moreover, our protocol provides result-set anonymity, which prevents LBS providers and other possible attackers from learning the meeting place location. Extensive experiments show that the proposed protocol is efficient in terms of computation and communication costs. A security analysis shows the resistance of the protocol against collusion, disruption and background knowledge attacks in a malicious model. en_US
dc.language.iso eng en_US
dc.publisher Springer London ltd. en_US
dc.rights info:eu-repo/semantics/closedAccess
dc.subject Location Privacy en_US
dc.subject Group Privacy en_US
dc.subject Location-Based Services en_US
dc.subject Secure Multiparty Computation en_US
dc.title The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services en_US
dc.type article en_US
dc.relation.journal Knowledge And information Systems en_US
dc.contributor.department TOBB ETU, Faculty of Engineering, Department of Computer Engineering en_US
dc.contributor.department TOBB ETÜ, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü tr_TR
dc.identifier.volume 45
dc.identifier.issue 3
dc.identifier.startpage 589
dc.identifier.endpage 615
dc.identifier.wos WOS:000362965400003
dc.identifier.scopus 2-s2.0-84945439310
dc.contributor.tobbetuauthor Selçuk, Ali Aydın
dc.contributor.YOKid 125410
dc.identifier.doi 10.1007/s10115-014-0809-0
dc.contributor.ScopusAuthorID 7004457288
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı tr_TR
dc.relation.other CyberSpace Research Institute of the Islamic Republic of Iran en_US

Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record