 A Two-level Protocol to Answer Private Location-based Queries Roopa Vishwanathan Yan Huang [RoopaVishwanathan, Computer Science and.

Slides:



Advertisements
Similar presentations
Oblivious Branching Program Evaluation
Advertisements

Efficient Evaluation of k-Range Nearest Neighbor Queries in Road Networks Jie BaoChi-Yin ChowMohamed F. Mokbel Department of Computer Science and Engineering.
Quality Aware Privacy Protection for Location-based Services Zhen Xiao, Xiaofeng Meng Renmin University of China Jianliang Xu Hong Kong Baptist University.
ITIS 6200/ Secure multiparty computation – Alice has x, Bob has y, we want to calculate f(x, y) without disclosing the values – We can only do.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Presenter: Nguyen Ba Anh HCMC University of Technology Information System Security Course.
Outsourcing Search Services on Private Spatial Data Man Lung Yiu, Gabriel Ghinita, Christian Jensen, and Panos Kalnis Presenter: Uma Kannan 1.
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation.
An Innovative Approach to Content Search Across P2P Inter-Networks Potharaju S.R.P Saradhi Mohmed Nazuruddin Shaik Potharaju S R Aditya Under The Guidance.
PrivacyGrid Visualization Balaji Palanisamy Saurabh Taneja.
Mohamed F. Mokbel University of Minnesota
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
Spatial Data Security Methods Avinash Kumar Sahu Under Guidance of Prof. (Mrs.) P. Venkatachalam Centre of Studies in Resources Engineering Indian Institute.
Location Privacy in Casper: A Tale of two Systems
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Private Information Retrieval Benny Chor, Oded Goldreich, Eyal Kushilevitz and Madhu Sudan Journal of ACM Vol.45 No Reporter : Chen, Chun-Hua Date.
PRIVÉ : Anonymous Location-Based Queries in Distributed Mobile Systems 1 National University of Singapore 2 University.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Private Information Retrieval Amos Beimel – Ben-Gurion University Tel-Hai, June 4, 2003 This talk is based on talks by:
MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-Based Queries Gabriel Ghinita, Panos Kalnis, Spiros Skiadopoulos National University of Singapore.
A Customizable k-Anonymity Model for Protecting Location Privacy Written by: B. Gedik, L.Liu Presented by: Tal Shoseyov.
F EELING - BASED L OCATION P RIVACY P ROTECTION FOR L OCATION - BASED S ERVICES CS587x Lecture Department of Computer Science Iowa State University Ames,
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
Privacy Preserving Data Mining on Moving Object Trajectories Győző Gidófalvi Geomatic ApS Center for Geoinformatik Xuegang Harry Huang Torben Bach Pedersen.
Authentication and Authorization Authentication is the process of verifying a principal’s identity (but how to define “identity”?) –Who the person is –Or,
Christian S. Jensen joint work with Man Lung Yiu, Hua Lu, Jesper Møller, Gabriel Ghinita, and Panos Kalnis Privacy for Spatial Queries.
1 SpaceTwist: A Flexible Approach for Hiding Query User Location Speaker: Man Lung Yiu Aalborg University Joint work with Christian S. Jensen, Xuegang.
Related Works LOFConclusion Introduction Contents ICISS
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Secure Conjunctive Keyword Search Over Encrypted Data Philippe Golle Jessica Staddon Palo Alto Research Center Brent Waters Princeton University.
A Hybrid Technique for Private Location-Based Queries with Database Protection Gabriel Ghinita 1 Panos Kalnis 2 Murat Kantarcioglu 3 Elisa Bertino 1 1.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Privacy-Preserving Location- Dependent Query Processing Mikhail J. Atallah and Keith B. Frikken Purdue University.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Private Information Retrieval Based on the talk by Yuval Ishai, Eyal Kushilevitz, Tal Malkin.
Privacy-Preserving and Content-Protecting Location Based Queries.
Secure Data Outsourcing
Privacy-Preserving Publication of User Locations in the Proximity of Sensitive Sites Bharath Krishnamachari Gabriel Ghinita Panos Kalnis National University.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Center for E-Business Technology Seoul National University Seoul, Korea Private Queries in Location Based Services: Anonymizers are not Necessary Gabriel.
Key management issues in PGP
Gabriel Ghinita1 Panos Kalnis1 Ali Khoshgozaran2 Cyrus Shahabi2
Searchable Encryption in Cloud
Public Key Encryption Major topics The RSA scheme was devised in 1978
Security Outline Encryption Algorithms Authentication Protocols
Reporter:Chien-Wen Huang
CPS 512 Distributed Systems
Feeling-based location privacy protection for LBS
WEP & WPA Mandy Kershishnik.
The first Few Slides stolen from Boaz Barak
Location Privacy.
Receiver Anonymity via Incomparable Public Keys
IMAGE-BASED AUTHENTICATION
9.2 SECURE CHANNELS Medisetty Swathy.
Efficient Evaluation of k-NN Queries Using Spatial Mashups
The Internet An Overview.
Assignment #4 – Solutions
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
CLUSTER BY: A NEW SQL EXTENSION FOR SPATIAL DATA AGGREGATION
KERBEROS.
CDK: Chapter 7 TvS: Chapter 9
Public-Key, Digital Signatures, Management, Security
Privacy preserving cloud computing
Secure Diffie-Hellman Algorithm
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
A Light-weight Oblivious Transfer Protocol Based on Channel Noise
Presentation transcript:

 A Two-level Protocol to Answer Private Location-based Queries Roopa Vishwanathan Yan Huang [RoopaVishwanathan, Computer Science and Engineering University of North Texas

Privacy Issues in Location-based Services  Client requests information from the server related to her current location  Client wants to maintain privacy and anonymity  Location can be associated with user identity, e.g. service request at your own house  Thus client does not want the server to know her location  Server wants to release as precise information as possible 06/09/09ISI 2009, Dallas, Texas1

Existing Approaches  Cloaking: k -anonymity [3][4][5]  Client requests are sent to an anonymizer  Anonymizer “cloaks” client’s location to a region that include k -1 other clients  Anonymizer forwards queries to the server using the cloaked location  Need to trust the anonymizer 06/09/09ISI 2009, Dallas, Texas2

Existing Approaches … cont’d  Peer-to-peer [6][7]  A client c searches for k-1 peers  One peer acts as agent on behalf c  Chosen agent forwards requests to server using cloaked region  Need to be able to find k-1 peers  Need to trust the chosen agent peer 306/09/09ISI 2009, Dallas, Texas

Drawbacks of Existing Approaches  Need to trust the anonymizer or peers  Reveals some spatial information (general region of query)  Correlation attacks  Could possibly identify the client  Large volume of query results 06/09/09ISI 2009, Dallas, Texas4

Problem Definition and Motivation  Nearest Neighbor Query Example: Find me the nearest gas station from the location based server (LBS)  Goal: Find a way to protect privacy of the client while ensuring server returns precise data  Privacy means: no release of identity or location of the client  Motivation: Recent research shows PIR is a feasible and privacy-preserving approach, but server reveals too much data 506/09/09ISI 2009, Dallas, Texas

Our Approach  Focus on Exact-Nearest-Neighbour queries  Uses PIR framework by Shahabi et al. [1] as a first step  Applies Oblivious Transfer [2] as the second step (to make server data precise) 06/09/09ISI 2009, Dallas, Texas6

Private Information Retrieval (PIR)  Based on a computationally hard problem  Client sends an encrypted request for information  Server does not know what it reveals 06/09/09ISI 2009, Dallas, Texas7 E (i) Bob: X[ 1,2,3,…..,N ]Alice: Wants bit i v(X, E(i))

PIR Theory 806/09/09ISI 2009, Dallas, Texas

PIR in Location-based Services 06/09/09ISI 2009, Dallas, Texas9  User input: [ y 1,y 2,..,y n ]  Server computes: z r = Π n j=1 w (r,j)  w (r,j)= y j 2 if M r,j = 0 and w (r,j)= y j otherwise  Server returns: z = [ z 1, z 2,.., z n ]  User computes: If z a ε QR, M a,b = 0 else M a,b = 1

Example of PIR in LBS 06/09/09ISI 2009, Dallas, Texas10  User location: M 2,3  User generates request: y =[y 1,y 2,y 3,y 4 ]  y 3 ε QNR, y 1,y 2,y 4 ε QR  Server replies: [z 1,z 2,z 3, z 4 ]  If z 2 ε QR, M 2,3 = 0, else M 2,3 = 1

Oblivious Transfer  Fundamental cryptographic protocol  Alice asks for one bit of information from Bob  Alice does not get to know any other bit  Bob does not know what bit Alice asked for  Many variants: 1-of-2, 1-of-n, k-of-n 1106/09/09ISI 2009, Dallas, Texas

Example of Oblivious Transfer (OT) 1206/09/09ISI 2009, Dallas, Texas

Exampleof OT … cont’d 1306/09/09ISI 2009, Dallas, Texas

The Two-level Protocol: First Step 06/09/09ISI 2009, Dallas, Texas14  Server divides the area into Voronoi cells and superimposes a grid on it  Each grid cell has list of Points Of Interests (POIs) associated with it  One POI each in a Voronoi cell  Contents of grid cells are the list of POIs

First Step: PIR …. cont’d 06/09/09ISI 2009, Dallas, Texas15  Client requests a column corresponding to its grid cell using PIR: e.g. PIR(C)  Server prepares encrypted column C

Second Step – Oblivious Transfer (OT)  Client initiates 1-of-n OT with server  Client and server agree on a set of keys  Server encrypts each bit of PIR response with a different set of keys (according to the index of the bit) and sends it across  Server and client exchange keys (through 1-of-2 OT)  Client can decrypt the bit it wants and none else 1606/09/09ISI 2009, Dallas, Texas

High-level View  Client knows it location  Tries to execute PIR to get its cell  Server prepares PIR response corresponding to a column that the client is in and encrypts it  Client and server engage in 1-of-n OT to get client’s cell from the column 1706/09/09ISI 2009, Dallas, Texas

High-level View … cont’d  Contents of client’s grid cell are its neighbours (Point of Interests of POIs)  Client can easily calculate which point is the nearest  May contain redundant POIs  Repeated/redundant POIs can be discarded 1806/09/09ISI 2009, Dallas, Texas

Complexity  N : number of objects (POIs),  M: number of bits in each  Request by client: O(M · N)  Response by server: O(M · N + √N log √N)  Total time: O(M · N + √N log √N) 1906/09/09ISI 2009, Dallas, Texas

Comparison of Costs 2006/09/09ISI 2009, Dallas, Texas ActionPIROTOur Two Level Protocol Req. by user O(√n)O(logn) O(√n+log√n) Res. By server O(m  √n)O(m  n)O(m  √n) Total time O(m  √n) O(m  logn + m  n) O(m  √n+log√n)

Conclusion  Contribution: Proposed a two-level protocol for private location queries  PIR over the entire grid – large amount of data would be revealed  OT over the entire grid – very expensive  Our approach – reduces amount of data revealed, not very expensive  Future direction: alternative approach (multi-level PIR) 2106/09/09ISI 2009, Dallas, Texas

References 1. G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi and K.Tan. Private Queries in Location Based Services: Anonymizers are not Necessary. In Proc. of ACM SIGMOD 2008, pp B. Pinkas and M. Naor. Efficient Oblivious Transfer Protocols. In Proc. Of 12 th ACM-SIAM Symposium on Discrete Algorithms. pp , B. Gedik and L. Liu. Privacy in mobile systems: A personalized anonymization model. In Proc. Of ICDCS. Pp , P. Kalnis, G. Ghinita, K. Mouratidis and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. In Proc. Of IEEE TKDE, pp , /09/09ISI 2009, Dallas, Texas

References … cont’d 5. M. Mokbel, C. Chow and W. Aref. The new Casper: Query Processing for location-based services without compromising privacy. In Proc. Of VLDB, pp , C.Y. Chow, M. Mokbel and X. Liu. A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In Proc. of ACM International Symposium on GIS. Pp , G. Ghinita, P. Kalnis and S. Skiadopoulos. PRIVE: Anonymous location-based queries in distributed mobile systems. In Proc. of 1 st Intl. Conference on World Wide Web (WWW), pp , /09/09ISI 2009, Dallas, Texas