Protecting Privacy Against Location-Based Personal Identification

Authors(4) :-Ram Prakash. R, Prabhu. K, Samson Sunny. S, Devi. S

In this paper we exhibit an answer for one of the area based inquiry issues. This issue is characterized as tails: (i) a client needs to inquiry a database of area information, known as Points Of Interest (POIs), and would not like to uncover his/her area to the server because of protection concerns; (ii) the holder of the area information, that is, the area server, would not like to just appropriate its information to all clients. The area server goals to have some control over its information, subsequent to the information is its advantage. We propose a noteworthy upgrade upon past arrangements by presenting a two stage approach, where the first step is in view of Oblivious Transfer and the second step is taking into account Private Information Retrieval, to attain to a protected answer for both sides. The arrangement we present is proficient and viable in numerous situations. We actualize our answer on a desktop machine and a cell phone to evaluate the proficiency of our convention. We additionally present a security demonstrate and dissect the security in the setting of our convention. At last, we highlight a security shortcoming of our past work and present an answer for overcome it.

Authors and Affiliations

Ram Prakash. R
Computer Science and Engineering, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
Prabhu. K
Computer Science and Engineering, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
Samson Sunny. S
Computer Science and Engineering, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India
Devi. S
Computer Science and Engineering, Dhanalakshmi College of Engineering, Chennai, Tamilnadu, India

Location based query, private query, private information retrieval, oblivious transfer

 [1]Russell Paulet, Md. Golam Kaosar, Xun Yi, and Elisa Bertino, Fellow, IEEE, “Privacy-Preserving and Content-Protecting Location Based Queries,” IEEE Transaction on Knowledg and Data Engineering , vol. 26, No. 5, May 2014 

[2]  (2011, Jul. 7) Openssl [Online].Available:http://

[3]M. Bellare and S. Micali, “Non-interactive oblivious transfer and applications,” in Proc. CRYPTO, 1990, pp. 547–557.

[4]A. Beresford and F. Stajano, “Location privacy in pervasive computing,”IEEE Pervasive Comput., vol. 2, no. 1, pp. 46–55, Jan.–Mar.2003.

[5]C. Bettini, X. Wang, and S. Jajodia, “Protecting privacy againstlocation-based personal identification,” in Proc. 2nd VDLB Int.Conf. SDM, W. Jonker and M. Petkovic, Eds., Trondheim, Norway,2005, pp. 185–199, LNCS 3674.

[6]X. Chen and J. Pang, “Measuring query privacy in location-based services,” in Proc. 2nd ACM CODASPY, San Antonio, TX, USA,2012, pp. 49–60.

[7]B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, “Private information retrieval,” J. ACM, vol. 45, no. 6, pp. 965–981, 1998.

[8]M. Damiani, E. Bertino, and C. Silvestri, “The PROBE framework for the personalized cloaking of private locations,” Trans. Data Privacy, vol. 3, no. 2, pp. 123–148, 2010.

[9]M. Duckham and L. Kulik, “A formal model of obfuscation and negotiation for location privacy,” in Proc. 3rd Int. Conf. Pervasive Comput., H. Gellersen, R. Want, and A. Schmidt, Eds., 2005, pp 243–251, LNCS 3468.

[10]T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Trans. Inform. Theory, vol. 31, no. 4, pp. 469–472, Jul. 1985.

[11]B. Gedik and L. Liu, “Location privacy in mobile systems: A personalized anonymization model,” in Proc. ICDCS, Columbus, OH,USA, 2005, pp. 620–629.

[12]C. Gentry and Z. Ramzan, “Single-database private information retrieval with constant communication rate,” in Proc. ICALP,L. Caires, G. Italiano, L. Monteiro, C. Palamidessi, and M. Yung,Eds., Lisbon, Portugal, 2005, pp. 803–815, LNCS 3580.

[13]G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, “A hybrid technique for private location-based queries with database protection,” in Proc. Adv. Spatial Temporal Databases, N. Mamoulis,T. Seidl, T. Pedersen, K. Torp, and I. Assent, Eds., Aalborg, Denmark, 2009, pp. 98–116, LNCS 5644.

[14]G. Ghinita, P. Kalnis, M. Kantarcioglu, and E. Bertino, “Approximate and exact hybrid algorithms for private nearestneighbor queries with database protection,” GeoInformatica, vol. 15, no. 14, pp. 1–28, 2010.

[15]G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, “Private queries in location based services: Anonymizers are not necessary,” in Proc. ACM SIGMOD, Vancouver, BC, Canada, 2008, pp. 121–132.

[16]G. Ghinita, C. R. Vicente, N. Shang, and E. Bertino, “Privacypreserving matching of spatial datasets with protection against background knowledge,” in Proc. 18th SIGSPATIAL Int. Conf. GIS, 2010, pp. 3–12.

[17]M. Gruteser and D. Grunwald, “Anonymous usage of locationbased services through spatial and temporal cloaking,” in Proc. 1st Int. Conf. MobiSys, 2003, pp. 31–42.

[18]T. Hashem and L. Kulik, “Safeguarding location privacy in wireless ad-hoc networks,” in Proc. 9th Int. Conf. UbiComp, Innsbruck, Austria, 2007, pp. 372–390.

[19]B. Hoh and M. Gruteser, “Protecting location privacy through path confusion,” in Proc. 1st Int. Conf. SecureComm, 2005, pp. 194–205.

[20]P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, “Preventing location-based identity inference in anonymous spatial queries,” IEEE Trans. Knowl. Data Eng., vol. 19, no. 12, pp. 1719–1733, Dec. 2007.

[21]H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services,” in Proc. Int. Conf. ICPS, 2005, pp. 88–97.

[22]J. Krumm, “A survey of computational location privacy,” Pers. Ubiquitous Comput., vol. 13, no. 6, pp. 391–399, Aug. 2009. 

[23]E. Kushilevitz and R. Ostrovsky, “Replication is not needed: Single database, computationally-private information retrieval,” in Proc. FOCS, Miami Beach, FL, USA, 1997, pp. 364–373.

[24]L. Marconi, R. Pietro, B. Crispo, and M. Conti, “Time warp: How time affects privacy in LBSs,” in Proc. ICICS, Barcelona, Spain, 2010, pp. 325–339.

[25]S. Mascetti and C. Bettini, “A comparison of spatial generalization algorithms for lbs privacy preservation,” in Proc. Int. Mobile Data Manage., Mannheim, Germany, 2007, pp. 258–262.

[26]M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: Query processing for location services without compromising privacy,” in Proc. VLDB, Seoul, Korea, 2006, pp. 763–774.

[27]M. Naor and B. Pinkas, “Oblivious transfer with adaptive queries,” in Proc. CRYPTO, vol. 1666, Santa Barbara, CA, USA, 1999, pp. 791–791.

[28]P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Proc. EUROCRYPT, vol. 1592, Prague, Czech Republic, 1999, pp. 223–238.

[29]R. Paulet, M. Golam Kaosar, X. Yi, and E. Bertino, “Privacypreserving and content-protecting location based queries,” in Proc. ICDE, Washington, DC, USA, 2012, pp. 44–53.

[30]B. Palanisamy and L. Liu, “MobiMix: Protecting location privacy with mix-zones over road networks,” in Proc. ICDE, Hannover, Germany, 2011, pp. 494–505.

[31]S. Pohlig and M. Hellman, “An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (corresp.),” IEEE Trans. Inform. Theory, vol. 24, no. 1, pp. 106–110, Jan. 1978.

[32]V. Shoup, (2011, Jul. 7). Number thoery library [Online]. Available:

[33]L. Sweeney, “k-Anonymity: A model for protecting privacy,” Int. J. Uncertain. Fuzziness Knowl. Based Syst., vol. 10, no. 5, pp. 557–570, Oct. 2002.

[34]T. Xu and Y. Cai, “Feeling-based location privacy protection for location-based services,” in Proc. 16th ACM CCS, Chicago, IL, USA, 2009, pp. 348–357.

Publication Details

Published in : Volume 1 | Issue 2 | March-April 2015
Date of Publication : 2015-04-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 259-264
Manuscript Number : IJSRSET152281
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Ram Prakash. R, Prabhu. K, Samson Sunny. S, Devi. S, " Protecting Privacy Against Location-Based Personal Identification , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 2, pp.259-264, March-April-2015.
Journal URL :

Article Preview

Follow Us

Contact Us