Skip to main content
Top

2018 | OriginalPaper | Chapter

Path Privacy Preservation Using Threshold Secret Sharing via Distributed Obfuscators in Directions Search

Author : Mihui Kim

Published in: Advances in Computer Science and Ubiquitous Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

On directions search, a frequently used mobile service, the path queries of a user may reveal the user private information, e.g., heath status, to service provider. In this paper, we propose a path privacy preservation mechanism utilizing K-threshold secret sharing through distributed obfuscators against directions search provider. A user randomly selects a set of K obfuscators in a pool of obfuscators. The obfuscators have a role in generating obfuscated path queries and querying them to a search server. They sign the query results with their partial secret and return them to the user. The user can verify the signed results and filter the results of the real query. Our proposed mechanism addresses the problem of one point of failure for an obfuscator and collusion attacks. Processing overhead can be controlled by managing the K value of partial secret share or the number of obfuscated queries, or clustering the obfuscated queries.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Location-Based Services and Real Time Location Systems Market by Location, Technology, Software, Hardware, Service and Application Area - Global Forecast to 2021. Markets and Markets, Report ID: 4507362, December 2016 Location-Based Services and Real Time Location Systems Market by Location, Technology, Software, Hardware, Service and Application Area - Global Forecast to 2021. Markets and Markets, Report ID: 4507362, December 2016
2.
go back to reference Lee, K.C., Lee, W.C., Leong, H.V., Zheng, B.: OPAQUE: protecting path privacy in directions search. In: IEEE 25th International Conference on Data Engineering, pp. 1271–1274 (2009) Lee, K.C., Lee, W.C., Leong, H.V., Zheng, B.: OPAQUE: protecting path privacy in directions search. In: IEEE 25th International Conference on Data Engineering, pp. 1271–1274 (2009)
3.
go back to reference Hong, J.I., Landay, J.A: An architecture for privacy-sensitive ubiquitous computing. In: 2nd International Conference on Mobile Systems, Applications, and Services, pp. 177–189 (2002) Hong, J.I., Landay, J.A: An architecture for privacy-sensitive ubiquitous computing. In: 2nd International Conference on Mobile Systems, Applications, and Services, pp. 177–189 (2002)
4.
go back to reference Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: 1st International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA (2003) Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: 1st International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA (2003)
5.
go back to reference Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19, 1719–1733 (2007)CrossRef Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19, 1719–1733 (2007)CrossRef
6.
go back to reference Mouratidis, K., Man, L.Y.: Anonymous query processing in road networks. IEEE Trans. Knowl. Data Eng. 22, 2–15 (2010)CrossRef Mouratidis, K., Man, L.Y.: Anonymous query processing in road networks. IEEE Trans. Knowl. Data Eng. 22, 2–15 (2010)CrossRef
7.
go back to reference Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Third International Conference on Pervasive Computing, Munich, Germany, pp. 152–170 (2005) Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Third International Conference on Pervasive Computing, Munich, Germany, pp. 152–170 (2005)
8.
go back to reference Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: 9th International Conference on Network Protocols, pp. 1–251 (2001) Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: 9th International Conference on Network Protocols, pp. 1–251 (2001)
Metadata
Title
Path Privacy Preservation Using Threshold Secret Sharing via Distributed Obfuscators in Directions Search
Author
Mihui Kim
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7605-3_182