TY - GEN
T1 - Authenticating location-based services without compromising location privacy
AU - HU, Haibo
AU - XU, Jianliang
AU - Chen, Qian
AU - Yang, Ziwei
N1 - Copyright:
Copyright 2012 Elsevier B.V., All rights reserved.
PY - 2012
Y1 - 2012
N2 - The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based forms. To address the trust issue, the service providers are expected to deliver their location-based services in an authenticatable manner, so that the correctness of the service results can be verified by the client. However, existing works on query authentication cannot preserve the privacy of the data being queried, which are sensitive user locations when it comes to location-based services and mSNSs. In this paper, we address this challenging problem by proposing a comprehensive solution that preserves unconditional location privacy when authenticating range queries. Three authentication schemes for R-tree and grid-file index, together with two optimization techniques, are developed. Cost models, security analysis, and experimental results consistently show the effectiveness, reliability and robustness of the proposed schemes under various system settings and query workloads.
AB - The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based forms. To address the trust issue, the service providers are expected to deliver their location-based services in an authenticatable manner, so that the correctness of the service results can be verified by the client. However, existing works on query authentication cannot preserve the privacy of the data being queried, which are sensitive user locations when it comes to location-based services and mSNSs. In this paper, we address this challenging problem by proposing a comprehensive solution that preserves unconditional location privacy when authenticating range queries. Three authentication schemes for R-tree and grid-file index, together with two optimization techniques, are developed. Cost models, security analysis, and experimental results consistently show the effectiveness, reliability and robustness of the proposed schemes under various system settings and query workloads.
KW - lbs
KW - privacy-preserving
KW - query authentication
UR - http://www.scopus.com/inward/record.url?scp=84862698613&partnerID=8YFLogxK
U2 - 10.1145/2213836.2213871
DO - 10.1145/2213836.2213871
M3 - Conference proceeding
AN - SCOPUS:84862698613
SN - 9781450312479
T3 - Proceedings of the ACM SIGMOD International Conference on Management of Data
SP - 301
EP - 312
BT - SIGMOD '12 - Proceedings of the International Conference on Management of Data
T2 - ACM SIGMOD International Conference on Management of Data, SIGMOD 2012
Y2 - 21 May 2012 through 24 May 2012
ER -