Please use this identifier to cite or link to this item: https://doi.org/10.1145/1376616.1376631
DC FieldValue
dc.titlePrivate queries in location based services: Anonymizers are not necessary
dc.contributor.authorGhinita, G.
dc.contributor.authorKalnis, P.
dc.contributor.authorKhoshgozaran, A.
dc.contributor.authorShahabi, C.
dc.contributor.authorTan, K.-L.
dc.date.accessioned2013-07-04T08:03:56Z
dc.date.available2013-07-04T08:03:56Z
dc.date.issued2008
dc.identifier.citationGhinita, G.,Kalnis, P.,Khoshgozaran, A.,Shahabi, C.,Tan, K.-L. (2008). Private queries in location based services: Anonymizers are not necessary. Proceedings of the ACM SIGMOD International Conference on Management of Data : 121-132. ScholarBank@NUS Repository. <a href="https://doi.org/10.1145/1376616.1376631" target="_blank">https://doi.org/10.1145/1376616.1376631</a>
dc.identifier.isbn9781605581026
dc.identifier.issn07308078
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/40422
dc.description.abstractMobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must not be disclosed. Existing solutions utilize a trusted anonymizer between the users and the LBS. This approach has several drawbacks: (i) All users must trust the third party anonymizer, which is a single point of attack, (ii) A large number of cooperating, trustworthy users is needed. (iii) Privacy is guaranteed only for a single snapshot of user locations; users are not protected against correlation attacks (e.g., history of user movement). We propose a novel framework to support private location-dependent queries, based on the theoretical work on Private Information Retrieval (PIR). Our framework does not require a trusted third party, since privacy is achieved via cryptographic techniques. Compared to existing work, our approach achieves stronger privacy for snapshots of user locations; moreover, it is the first to provide provable privacy guarantees against correlation attacks. We use our framework to implement approximate and exact algorithms for nearest-neighbor search. We optimize query execution by employing data mining techniques, which identify redundant computations. Contrary to common belief, the experimental results suggest that PIR approaches incur reasonable overhead and are applicable in practice. Copyright 2008 ACM.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/1376616.1376631
dc.sourceScopus
dc.subjectLocation anonymity
dc.subjectPrivate information retrieval
dc.subjectQuery privacy
dc.typeConference Paper
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1145/1376616.1376631
dc.description.sourcetitleProceedings of the ACM SIGMOD International Conference on Management of Data
dc.description.page121-132
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.