Towards Region Queries with Strong Location Privacy in Mobile Network

With the interaction of geographic data and social data, the inference attack has been mounting up, calling for new technologies for privacy protection. Although there are many tangible contributions of spatial-temporal cloaking technologies, traditional technologies are not enough to resist privacy...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Songtao Yang, Qingfeng Jiang
Formato: article
Lenguaje:EN
Publicado: Hindawi Limited 2021
Materias:
Acceso en línea:https://doaj.org/article/0eca9f484e4b424695d8173dda1a7496
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:0eca9f484e4b424695d8173dda1a7496
record_format dspace
spelling oai:doaj.org-article:0eca9f484e4b424695d8173dda1a74962021-11-29T00:56:17ZTowards Region Queries with Strong Location Privacy in Mobile Network1875-905X10.1155/2021/5972486https://doaj.org/article/0eca9f484e4b424695d8173dda1a74962021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/5972486https://doaj.org/toc/1875-905XWith the interaction of geographic data and social data, the inference attack has been mounting up, calling for new technologies for privacy protection. Although there are many tangible contributions of spatial-temporal cloaking technologies, traditional technologies are not enough to resist privacy intrusion. Malicious attackers still steal user-sensitive information by analyzing the relationship between location and query semantics. Reacting to many interesting issues, oblivious transfer (OT) protocols are introduced to guarantee location privacy. To our knowledge, OT is a cryptographic primitive between two parties and can be used as a building block for any arbitrary multiparty computation protocol. Armed with previous privacy-preserving technologies, for example, OT, in this work, we first develop a novel region queries framework that can provide robust privacy for location-dependent queries. We then design an OT-assist privacy-aware protocol (or OTPA) for location-based service with rigorous security analysis. In short, the common query of the client in our solution can be divided into two parts, the region query Rq and the content query Cq, to achieve location k-anonymity, location m-diversity, and query r-diversity, which ensure the privacy of two parties (i.e., client and server). Lastly, we instantiate our OTPA protocol, and experiments show that the proposed OTPA protocol is reasonable and effective.Songtao YangQingfeng JiangHindawi LimitedarticleTelecommunicationTK5101-6720ENMobile Information Systems, Vol 2021 (2021)
institution DOAJ
collection DOAJ
language EN
topic Telecommunication
TK5101-6720
spellingShingle Telecommunication
TK5101-6720
Songtao Yang
Qingfeng Jiang
Towards Region Queries with Strong Location Privacy in Mobile Network
description With the interaction of geographic data and social data, the inference attack has been mounting up, calling for new technologies for privacy protection. Although there are many tangible contributions of spatial-temporal cloaking technologies, traditional technologies are not enough to resist privacy intrusion. Malicious attackers still steal user-sensitive information by analyzing the relationship between location and query semantics. Reacting to many interesting issues, oblivious transfer (OT) protocols are introduced to guarantee location privacy. To our knowledge, OT is a cryptographic primitive between two parties and can be used as a building block for any arbitrary multiparty computation protocol. Armed with previous privacy-preserving technologies, for example, OT, in this work, we first develop a novel region queries framework that can provide robust privacy for location-dependent queries. We then design an OT-assist privacy-aware protocol (or OTPA) for location-based service with rigorous security analysis. In short, the common query of the client in our solution can be divided into two parts, the region query Rq and the content query Cq, to achieve location k-anonymity, location m-diversity, and query r-diversity, which ensure the privacy of two parties (i.e., client and server). Lastly, we instantiate our OTPA protocol, and experiments show that the proposed OTPA protocol is reasonable and effective.
format article
author Songtao Yang
Qingfeng Jiang
author_facet Songtao Yang
Qingfeng Jiang
author_sort Songtao Yang
title Towards Region Queries with Strong Location Privacy in Mobile Network
title_short Towards Region Queries with Strong Location Privacy in Mobile Network
title_full Towards Region Queries with Strong Location Privacy in Mobile Network
title_fullStr Towards Region Queries with Strong Location Privacy in Mobile Network
title_full_unstemmed Towards Region Queries with Strong Location Privacy in Mobile Network
title_sort towards region queries with strong location privacy in mobile network
publisher Hindawi Limited
publishDate 2021
url https://doaj.org/article/0eca9f484e4b424695d8173dda1a7496
work_keys_str_mv AT songtaoyang towardsregionquerieswithstronglocationprivacyinmobilenetwork
AT qingfengjiang towardsregionquerieswithstronglocationprivacyinmobilenetwork
_version_ 1718407689925558272