Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/1155
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ashouri-Talouki, Maede | - |
dc.contributor.author | Baraani-Dastjerdi, Ahmad | - |
dc.contributor.author | Selçuk, Ali Aydın | - |
dc.date.accessioned | 2019-06-26T07:40:34Z | |
dc.date.available | 2019-06-26T07:40:34Z | |
dc.date.issued | 2015-12 | |
dc.identifier.citation | Ashouri-Talouki, M., Baraani-Dastjerdi, A., & Selçuk, A. A. (2015). The cloaked-centroid protocol: location privacy protection for a group of users of location-based services. Knowledge and Information Systems, 45(3), 589-615. | en_US |
dc.identifier.issn | 0219-1377 | |
dc.identifier.uri | https://link.springer.com/article/10.1007%2Fs10115-014-0809-0 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.11851/1155 | - |
dc.description.abstract | Several techniques have been recently proposed to protect user location privacy while accessing location-based services (LBSs). However, applying these techniques to protect location privacy for a group of users would lead to user privacy leakage and query inefficiency. In this paper, we propose a two-phase protocol, we name Cloaked-Centroid, which is designed specifically to protect location privacy for a group of users. We identify location privacy issues for a group of users who may ask an LBS for a meeting place that is closest to the group centroid. Our protocol relies on spatial cloaking, an anonymous veto network and a conference key establishment protocol. In the first phase, member locations are cloaked into a single region based on their privacy profiles, and then, a single query is submitted to an LBS. In the second phase, a special secure multiparty computation extracts the meeting point result from the received answer set. Our protocol is resource aware, taking into account the LBS overhead and the communication cost, i.e., the number of nearest neighbor queries sent to a service provider and the number of returned points of interests. Regarding privacy, Cloaked-Centroid protects the location privacy of each group member from those in the group and from anyone outside the group, including the LBS. Moreover, our protocol provides result-set anonymity, which prevents LBS providers and other possible attackers from learning the meeting place location. Extensive experiments show that the proposed protocol is efficient in terms of computation and communication costs. A security analysis shows the resistance of the protocol against collusion, disruption and background knowledge attacks in a malicious model. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer London ltd. | en_US |
dc.relation.ispartof | Knowledge And information Systems | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Location Privacy | en_US |
dc.subject | Group Privacy | en_US |
dc.subject | Location-Based Services | en_US |
dc.subject | Secure Multiparty Computation | en_US |
dc.title | The Cloaked-Centroid Protocol: Location Privacy Protection for a Group of Users of Location-Based Services | en_US |
dc.type | Article | en_US |
dc.department | Faculties, Faculty of Engineering, Department of Computer Engineering | en_US |
dc.department | Fakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | tr_TR |
dc.identifier.volume | 45 | |
dc.identifier.issue | 3 | |
dc.identifier.startpage | 589 | |
dc.identifier.endpage | 615 | |
dc.identifier.wos | WOS:000362965400003 | en_US |
dc.identifier.scopus | 2-s2.0-84945439310 | en_US |
dc.institutionauthor | Selçuk, Ali Aydın | - |
dc.identifier.doi | 10.1007/s10115-014-0809-0 | - |
dc.authorscopusid | 7004457288 | - |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.relation.other | CyberSpace Research Institute of the Islamic Republic of Iran | en_US |
dc.identifier.scopusquality | Q1 | - |
item.openairetype | Article | - |
item.languageiso639-1 | en | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
crisitem.author.dept | 02.3. Department of Computer Engineering | - |
Appears in Collections: | Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
11
checked on Dec 21, 2024
WEB OF SCIENCETM
Citations
12
checked on Dec 21, 2024
Page view(s)
126
checked on Dec 16, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.