skip to main content
10.1145/2493432.2494524acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
short-paper

Protecting privacy for group nearest neighbor queries with crowdsourced data and computing

Authors Info & Claims
Published:08 September 2013Publication History

ABSTRACT

User privacy in location-based services (LBSs) has become an important research area. We introduce a new direction to protect user privacy that evaluates LBSs with crowdsourced data and computation and eliminates the role of a location-based service provider. We focus on the group nearest neighbor (GNN) query that allows a group to meet at their nearest point of interest such as a restaurant that minimizes the total or maximum distance of the group. We develop a crowdsource-based approach, called PrivateMeetUp, to evaluate GNN queries in a privacy preserving manner and implement a working prototype of PrivateMeetUp.

References

  1. Ashouri-Talouki, M., Baraani-Dastjerdi, A., and Selçuk, A. A. Glp: A cryptographic approach for group location privacy. Computer Communications 35, 12 (2012), 1527--1533. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ghinita, G. Private queries and trajectory anonymization: a dual perspective on location privacy. TDP 2, 1 (2009), 3--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., and Tan, K.-L. Private queries in location based services: anonymizers are not necessary. In SIGMOD (2008), 121--132. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Gruteser, M., and Grunwald, D. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys (2003), 31--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Hashem, T., and Kulik, L. Safeguarding location privacy in wireless ad-hoc networks. In Ubicomp (2007), 372--390. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Hashem, T., Kulik, L., and Zhang, R. Privacy preserving group nearest neighbor queries. In EDBT (2010), 489--500. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Huang, Y., and Vishwanathan, R. Privacy preserving group nearest neighbour queries in location-based services using cryptographic techniques. In GLOBECOM (2010), 1--5.Google ScholarGoogle Scholar
  8. Krumm, J. A survey of computational location privacy. PUC 13 (2009), 391--399. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Microsoft. Location & privacy: Where are we headed?, (accessed Sept 2, 2011). http://www.microsoft.com/privacy/dpd.Google ScholarGoogle Scholar
  10. Papadias, D., Shen, Q., Tao, Y., and Mouratidis, K. Group nearest neighbor queries. In ICDE (2004), 301--310. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Shankar, P., Huang, Y.-W., Castro, P., Nath, B., and Iftode, L. Crowds replace experts: Building better location-based services using mobile social network interactions. In PerCom (2012), 20--29.Google ScholarGoogle Scholar
  12. TouristPOIs. http://downloads.cloudmade.com/oceania/australia_and_new_zealand/austra%lia\#downloads\_breadcrumbs.Google ScholarGoogle Scholar

Index Terms

  1. Protecting privacy for group nearest neighbor queries with crowdsourced data and computing

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        UbiComp '13: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
        September 2013
        846 pages
        ISBN:9781450317702
        DOI:10.1145/2493432

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 September 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        UbiComp '13 Paper Acceptance Rate92of394submissions,23%Overall Acceptance Rate764of2,912submissions,26%

        Upcoming Conference

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader