APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.

Slides:



Advertisements
Similar presentations
An Alternative to Short Lived Certificates By Vipul Goyal Department of Computer Science & Engineering Institute of Technology Banaras Hindu University.
Advertisements

UNIVERSITY OF JYVÄSKYLÄ Mobile Chedar – A Peer-to-Peer Middleware for Mobile Devices Presentation for International Workshop on Mobile Peer-to- Peer Computing.
Supporting Cooperative Caching in Disruption Tolerant Networks
Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas Anderson, Arvind Krishnamurthy, David Wetherall University.
CSE300-1 Profs. Steven A. Demurjian Q. Jin, J. Nam, Z. Qian and C. Phillips Computer Science & Engineering Department 191 Auditorium Road, Box U-155 The.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Public Key Infrastructure Ben Sangster February 23, 2006.
Secure and Efficient Key Management in Mobile Ad Hoc Networks Bing Wu, Jie Wu, Eduardo B. Fernandez, Mohammad Ilyas, Spyros Magliveras Department of Computer.
Sharmistha Chatterjee 82349D 82349D Helsinki University of Technology Instant Messaging and Presence with SIP.
LAAC: A Location-Aware Access Control Protocol YounSun Cho, Lichun Bao and Michael T. Goodrich IWUAC 2006.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Spring 2010 – Dr. Son VuongCpsc Cpsc 527 Project List n LIVES (Mobile Learning) (Learning through Interactive Voice Educational System) u A alpha-beta.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols Li Lu, Lei Hu State Key Lab of Information Security, Graduate School.
1 電子商務代理人與無線射頻系統上安全設計之研究 The Study of Secure Schemes on Agent-based Electronic Commerce Transaction and RFID system 指導教授 : 詹進科 教授 (Prof. Jinn-Ke Jan) 陳育毅.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
By Jyh-haw Yeh Boise State University ICIKM 2013.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Cloud Computing Introduction to China-cloud Project and Related Works in JSI Yi Liu Sino-German Joint Software Institute, Beihang Univ. May 2011.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Masud Hasan Secue VS Hushmail Project 2.
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
MASY: Management of Secret keYs in Mobile Federated Wireless Sensor Networks Jef Maerien IBBT DistriNet Research Group Department of Computer Science Katholieke.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
MIME Object Security Services (MOSS). Privacy Enhanced Mail (PEM) was the first Internet standard to address security in messages. The MOSS protocol.
1 Configurable Security for Scavenged Storage Systems NetSysLab The University of British Columbia Abdullah Gharaibeh with: Samer Al-Kiswany, Matei Ripeanu.
Department of Information Engineering The Chinese University of Hong Kong A Framework for Monitoring and Measuring a Large-Scale Distributed System in.
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
ANNA UNIVERSITY, CHENNAI PROJECT VIVA FINAL YEAR MCA( ) 04/07/2013.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Internet Real-Time Laboratory Arezu Moghadam and Suman Srinivasan Columbia University in the city of New York 7DS System Design 7DS system is an architecture.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Data Access and Security in Multiple Heterogeneous Databases Afroz Deepti.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
This document is for academic purposes only. © 2012 Department of Computer Science, Hong Kong Baptist University. All rights reserved. 1 Authenticating.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Participatory Privacy: Enabling Privacy in Participatory Sensing
FRAC: Implementing Role-Based Access Control for Network File Systems Aniruddha Bohra, Stephen Smaldone, and Liviu Iftode Department of Computer Science.
1 Covert Communication based Privacy Preservation in Mobile Vehicular Networks Rasheed Hussain*, Donghyun Kim**, Alade O. Tokuta**, Hayk M. Melikyan**,
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Università di Perugia Enabling Grids for E-sciencE Status of and requirements for Computational Chemistry NA4 – SA1 Meeting – 6 th April.
Video Caching in Radio Access network: Impact on Delay and Capacity
1 A Service-based Approach to Developing Android Mobile Internet Device (MID) Applications Hyun Jung La and Soo Dong Kim Department of Computer Science.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
MSc Thesis: Mohammad Khodaei Supervisor: Prof. Panos Papadimitratos
Energy-Efficient Storage Systems
“Location Privacy Protection for Smartphone Users”
Formal Analysis and Applications of Direct Anonymous Attestation
Design and Implementation of OverLay Multicast Tree Protocol
Presentation transcript:

APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University, University Park, PA {zzhu,

outline Introduction Preliminaries The Location Proof Updating System Security Analysis and Countermeasures Performance Evaluation Conclusions

outline Introduction Preliminaries The Location Proof Updating System Security Analysis and Countermeasures Performance Evaluation Conclusions

Introduction Location-based Services User location information Provide mobile users with a unique style of resource and services

Target: collecting a set of location proofs for each peer node. protecting the location privacy of peer nodes from each other, from adversary.

outline Introduction Preliminaries The Location Proof Updating System Security Analysis and Countermeasures Performance Evaluation Conclusions

Preliminaries Pseudonym Online Certification Authority Mobile node i with a set of M public/private key pairs. K i Pub serve as the pseudonyms of node i. K i prv enable node i to digitally sign messages.

Threat Model Target: track the location of mobile nodes. The adversary is internal, passive and global. Internal Passive Global

outline Introduction Preliminaries The Location Proof Updating System Security Analysis and Countermeasures Performance Evaluation Conclusions

The Location Proof Updating System Architecture Protocol Scheduling Location Proof Updates

Architecture Prover Witness Server CA Verifier

Protocol

(1) The prover broadcasts a location proof request through Bluetooth interface. (2) The witness decides whether to accept the location proof request. (3) the prover is responsible for submitting this proof to the location proof server.

Protocol (4) An authorized verifier can query the CA for location proofs of a specific prover. (5) The location proof server only returns hashed location rather than the real location to the CA, who then forwards to the verifier.

Scheduling Location Proof Updates

outline Introduction Preliminaries The Location Proof Updating System Security Analysis and Countermeasures Performance Evaluation Conclusions

Source Location Privacy Definition 2: source location unobservability. Identity I, observation O ∨ O, P(I) = P(I|O), the I is called unobservable.

Source Location Privacy Obviously, a system satisfies source location unobservability if and only if it has the property of pseudonym unlinkability.

Source Location Privacy

outline Introduction Preliminaries The Location Proof Updating System Security Analysis and Countermeasures Performance Evaluation Conclusions

Performance Evaluation Prototype Implementation Simulation results

Prototype Implementation Client: JAVA, Android Developer Phone, Android 1.6 OS. Server: C++, T GHz 3GB RAM laptop.

Prototype Implementation

Simulation results 1000 mobile nodes 3km * 3km area Each node has M=10 pairs of 128-bit public/private keys Interval proof : the required interval between two location proof updates. Interval contact : the mean real contact interval.

Message overhead ratio: the ratio of dummy traffic and real proof traffic.

Simulation results Proof delivery ratio: the percentage of location proof message that successfully uploaded to the location proof server.

Simulation results Average delay: the time difference between the time when a location proof update is needed and when the location proof message has reach the location proof server.

outline Introduction Preliminaries The Location Proof Updating System Security Analysis and Countermeasures Performance Evaluation Conclusions

This paper proposed a privacy-preserving location proof updating system, called APPLAUS. It uses statistically changed pseudonyms for each device to protect source location privacy. Extensive experimental and simulation results show that APPLAUS can provide location proofs effectively while preserving the source location privacy at the same time.

Thank you!