DOI: 10.1007/978-3-540-73540-3_14
|View full text |Cite
|
Sign up to set email alerts
|

Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy

Abstract: Abstract. In this paper we propose a fundamental approach to perform the class of Nearest Neighbor (NN) queries, the core class of queries used in many of the location-based services, without revealing the origin of the query in order to preserve the privacy of this information. The idea behind our approach is to utilize one-way transformations to map the space of all static and dynamic objects to another space and resolve the query blindly in the transformed space. However, in order to become a viable approac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
184
0

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 223 publications
(188 citation statements)
references
References 17 publications
0
184
0
Order By: Relevance
“…A similar problem on kNN computation at an untrusted platform is studied for location based services (LBS) [8,17,9,13], where users submit queries to an untrusted server which holds the data. The focus of such applications is on protecting the privacy of users (query content), since the database is assumed to be owned by the server [9].…”
Section: Knn On Sconedb Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…A similar problem on kNN computation at an untrusted platform is studied for location based services (LBS) [8,17,9,13], where users submit queries to an untrusted server which holds the data. The focus of such applications is on protecting the privacy of users (query content), since the database is assumed to be owned by the server [9].…”
Section: Knn On Sconedb Modelmentioning
confidence: 99%
“…Though the safety level of DPT is not high, we remark that DPT is useful in situations where only level-1 attacks are concerned. kNN computation at an untrusted platform is also considered in location-based service (LBS) systems [8,17,9,13]. In LBS models, a server holds a set of tuples namely points of interest (POI).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Various privacy protection algorithms proposed for data privacy have been adopted for protecting location privacy of mobile users. The types of privacy protection algorithms include anonymization [1,5,8,10,13,20], data suppression [18], trajectory inference prevention [2,3,[14][15][16] and encryption [11]. While most of the existing schemes are aimed at preventing the adversary from distinguishing the location of a given user from that of other users, their perturbation techniques are mostly unidirectional and lack the ability to de-anonymize the perturbed information even when a user accessing the information has suitable credentials for obtaining finer information.…”
Section: Related Workmentioning
confidence: 99%
“…[13] ignores non-querying users, and instead groups only querying users among themselves. [14] proposes a location privacy method specifically for approximate NN processing. In [15,16] the user u forwards to the LBS a set of dummy locations in addition to his/her own.…”
Section: Alternative Location Obfuscation Approachesmentioning
confidence: 99%