logo

SCIENCE CHINA Information Sciences, Volume 63 , Issue 3 : 132105(2020) https://doi.org/10.1007/s11432-019-1508-6

PPLS: a privacy-preserving location-sharing scheme in mobile online social networks

More info
  • ReceivedApr 4, 2019
  • AcceptedAug 2, 2019
  • PublishedFeb 10, 2020

Abstract


References

[1] Chen J, Wu G, Shen L. Differentiated security levels for personal identifiable information in identity management system. Expert Syst Appl, 2011, CrossRef Google Scholar

[2] Dinh H T, Lee C, Niyato D. A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput, 2013, 13: 1587-1611 CrossRef Google Scholar

[3] Barkhuus L, Dey A K. Location-based services for mobile telephony: a study of users' privacy concerns. In: Proceedings of International Conference on Human-Computer Interaction, Zurich, 2003. 702--712. Google Scholar

[4] Wei W, Xu F Y, Li Q. Mobishare: flexible privacy-preserving location sharing in mobile online social networks. In: Proceedings of IEEE INFOCOM, 2012. 2616--2620. Google Scholar

[5] Liu Z L, Li J, Chen X F, et al. New privacy-preserving location sharing system for mobile online social networks. In: Proceedings of the 8th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Compiegne, 2013. 214--218. Google Scholar

[6] Liu Z, Luo D, Li J. N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks. Int J Comput Math, 2016, 93: 384-400 CrossRef Google Scholar

[7] Li J W, Li J, Chen X F, et al. $\{$MobiShare$\}$+: security improved system for location sharing in mobile online social networks. J Internet Serv Inf Secur, 2014, 4: 25--36. Google Scholar

[8] Shen N, Yang J, Yuan K. An efficient and privacy-preserving location sharing mechanism. Comput Standards Interfaces, 2016, 44: 102-109 CrossRef Google Scholar

[9] Li J, Yan H, Liu Z. Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks. IEEE Syst J, 2017, 11: 439-448 CrossRef ADS Google Scholar

[10] Xiao X, Chen C, Sangaiah A K. CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks. Future Generation Comput Syst, 2018, 86: 863-872 CrossRef Google Scholar

[11] Xiao Y, Rayi V K, Sun B. A survey of key management schemes in wireless sensor networks. Comput Commun, 2007, 30: 2314-2341 CrossRef Google Scholar

[12] Du X, Xiao Y, Guizani M. An effective key management scheme for heterogeneous sensor networks. Ad Hoc Networks, 2007, 5: 24-34 CrossRef Google Scholar

[13] Du X, Guizani M, Xiao Y. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks. IEEE Trans Wireless Commun, 2009, 8: 1223-1229 CrossRef Google Scholar

[14] Kandah F, Zhang W Y, Du X J, et al. A secure key management scheme in wireless mesh networks. In: Proceedings of IEEE International Conference on Communications, Kyoto, 2011. 1--5. Google Scholar

[15] Lipmaa H. Verifiable homomorphic oblivious transfer and private equality test. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer, 2003. 416--433. Google Scholar

[16] Golle P. A private stable matching algorithm. In: Proceedings of International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2006. 65--80. Google Scholar

[17] Bellare M, Rogaway P. The exact security of digital signatures - how to sign with RSA and rabin. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, 1996. 399--416. Google Scholar

[18] Yan C, Ni Z, Cao B. UMBRELLA: user demand privacy preserving framework based on association rules and differential privacy in social networks. Sci China Inf Sci, 2018, 62: 39106 CrossRef Google Scholar

[19] Ju X, Shin K G. Location Privacy Protection for Smartphone Users Using Quadtree Entropy Maps. J Inf Privacy Security, 2015, 11: 62-79 CrossRef Google Scholar

[20] Rao U P, Girme H. A novel framework for privacy preserving in location based services. In: Proceedings of International Conference on Advanced Computing & Communication Technologies (ACCT), 2015. 272--277. Google Scholar

[21] Das A K. A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int J Commun Syst, 2017, 30: e2933 CrossRef Google Scholar

[22] Sweeney L. k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY. Int J Unc Fuzz Knowl Based Syst, 2002, 10: 557-570 CrossRef Google Scholar

[23] Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications, and Services, San Francisco, 2003. 31--42. Google Scholar

[24] Kido H, Yanagisawa Y, Satoh T. Protection of location privacy using dummies for location-based services. In: Proceedings of the 21st International Conference on Data Engineering Workshops, Tokyo, 2005. 1248. Google Scholar

[25] Khoshgozaran A, Shahabi C. Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: Proceedings of the 10th International Symposium on Advances in Spatial and Temporal Databases, Boston, 2007. 239--257. Google Scholar

[26] Cox L P, Dalton A, Marupadi V. Smokescreen: flexible privacy controls for presence-sharing. In: Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, 2007. 233--245. Google Scholar

  • Figure 1

    (Color online) System architecture.

  • Table 1   Summary of notations
    Symbol Description
    ID A user's social network identifier
    PID A user's pseudo-identifier
    MS Mobile online social network server
    LSs Location servers
    df Threshold distance for a friend
    ds Threshold distance for strangers
    $({\rm~pk}_u,{\rm~sk}_u)$ A user's public-private key pair
    $({\rm~pk}_m,{\rm~sk}_m)$ MS's public-private key pair
    $({\rm~pk}_s,{\rm~sk}_s)$ LS's public-private key pair
    tl The time length for LS to save a record
    ts Time stamp
    $t$ Users' location update cycle
    $(x,y)$ Location of a user
    dis$(u_i,u_j)$ Distance between $u_i$ and $u_j$
    PE Paillier encryption algorithm
    PD Paillier decryption algorithm