




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、A Two-level Protocol to Answer Private Location-based QueriesRoopa VishwanathanYan HuangRoopaVishwanathan, Computer Science and EngineeringUniversity of North TexasPrivacy Issues in Location-based ServicesClient requests information from the server related to her current locationClient wants to main
2、tain privacy and anonymityLocation can be associated with user identity, e.g. service request at your own houseThus client does not want the server to know her locationServer wants to release as precise information as possible06/09/09ISI 2009, Dallas, Texas1Existing ApproachesCloaking: k-anonymity 3
3、45Client requests are sent to an anonymizerAnonymizer “cloaks” clients location to a region that include k-1 other clientsAnonymizer forwards queries to the server using the cloaked locationNeed to trust the anonymizer06/09/09ISI 2009, Dallas, Texas2Existing Approaches contdPeer-to-peer 67A client c
4、 searches for k-1 peersOne peer acts as agent on behalf cChosen agent forwards requests to server using cloaked regionNeed to be able to find k-1 peersNeed to trust the chosen agent peer306/09/09ISI 2009, Dallas, TexasDrawbacks of Existing ApproachesNeed to trust the anonymizer or peersReveals some
5、spatial information (general region of query)Correlation attacksCould possibly identify the clientLarge volume of query results06/09/09ISI 2009, Dallas, Texas4Problem Definition and MotivationNearest Neighbor Query Example: Find me the nearest gas station from the location based server (LBS)Goal: Fi
6、nd a way to protect privacy of the client while ensuring server returns precise dataPrivacy means: no release of identity or location of the clientMotivation: Recent research shows PIR is a feasible and privacy-preserving approach, but server reveals too much data 506/09/09ISI 2009, Dallas, TexasOur
7、 ApproachFocus on Exact-Nearest-Neighbour queriesUses PIR framework by Shahabi et al. 1 as a first stepApplies Oblivious Transfer 2 as the second step (to make server data precise)06/09/09ISI 2009, Dallas, Texas6Private Information Retrieval (PIR)Based on a computationally hard problemClient sends a
8、n encrypted request for informationServer does not know what it reveals06/09/09ISI 2009, Dallas, Texas7E (i)Bob: X 1,2,3,.,N Alice: Wants bit iv(X, E(i)PIR Theory806/09/09ISI 2009, Dallas, TexasPIR in Location-based Services06/09/09ISI 2009, Dallas, Texas9User input: y1,y2,.,yn Server computes: zr =
9、 nj=1 w (r,j)w (r,j)=yj2 if Mr,j = 0 and w (r,j)=yj otherwiseServer returns: z = z1, z2, ., znUser computes: If za QR, Ma,b = 0else Ma,b = 1Example of PIR in LBS06/09/09ISI 2009, Dallas, Texas10User location: M2,3User generates request: y =y1,y2,y3,y4y3 QNR, y1,y2,y4 QRServer replies: z1,z2,z3,z4If
10、z2 QR, M2,3 = 0, else M2,3 = 1Oblivious TransferFundamental cryptographic protocolAlice asks for one bit of information from BobAlice does not get to know any other bit Bob does not know what bit Alice asked for Many variants: 1-of-2, 1-of-n, k-of-n1106/09/09ISI 2009, Dallas, TexasExample of Oblivio
11、us Transfer (OT)1206/09/09ISI 2009, Dallas, TexasExampleof OT contd1306/09/09ISI 2009, Dallas, TexasThe Two-level Protocol: First Step06/09/09ISI 2009, Dallas, Texas14Server divides the area into Voronoi cells and superimposes a grid on itEach grid cell has list of Points Of Interests (POIs) associa
12、ted with itOne POI each in a Voronoi cellContents of grid cells are the list of POIsFirst Step: PIR . contd06/09/09ISI 2009, Dallas, Texas15Client requests a column corresponding to its grid cell using PIR: .PIR(C)Server prepares encrypted column CSecond Step Oblivious Transfer (OT)Client initiates
13、1-of-n OT with serverClient and server agree on a set of keys Server encrypts each bit of PIR response with a different set of keys (according to the index of the bit) and sends it acrossServer and client exchange keys (through 1-of-2 OT)Client can decrypt the bit it wants and none else1606/09/09ISI
14、 2009, Dallas, TexasHigh-level ViewClient knows it locationTries to execute PIR to get its cellServer prepares PIR response corresponding to a column that the client is in and encrypts itClient and server engage in 1-of-n OT to get clients cell from the column1706/09/09ISI 2009, Dallas, TexasHigh-le
15、vel View contdContents of clients grid cell are its neighbours (Point of Interests of POIs)Client can easily calculate which point is the nearest May contain redundant POIsRepeated/redundant POIs can be discarded1806/09/09ISI 2009, Dallas, TexasComplexity N : number of objects (POIs), M: number of b
16、its in eachRequest by client: O(M N)Response by server: O(MN + N log N)Total time: O(MN + N log N)1906/09/09ISI 2009, Dallas, TexasComparison of Costs2006/09/09ISI 2009, Dallas, TexasActionPIROTOur Two Level ProtocolReq. by user O(n)O(logn) O(n+logn)Res. By serverO(mn)O(mn)O(mn)Total timeO(mn)O(mlog
17、n+mn)O(mn+logn)ConclusionContribution: Proposed a two-level protocol for private location queriesPIR over the entire grid large amount of data would be revealedOT over the entire grid very expensiveOur approach reduces amount of data revealed, not very expensiveFuture direction: alternative approach
18、 (multi-level PIR)2106/09/09ISI 2009, Dallas, TexasReferencesG. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi and K.Tan. Private Queries in Location Based Services: Anonymizers are not Necessary. In Proc. of ACM SIGMOD 2008, pp. 121-132.B. Pinkas and M. Naor. Efficient Oblivious Transfer Protocols
19、. In Proc. Of 12th ACM-SIAM Symposium on Discrete Algorithms. pp. 448-457, 2001.B. Gedik and L. Liu. Privacy in mobile systems: A personalized anonymization model. In Proc. Of ICDCS. Pp. 620-629, 2005.P. Kalnis, G. Ghinita, K. Mouratidis and D. Papadias. Preventing location-based identity inference in anonymous spatial queries. In Proc. Of IE
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 廣東舞蹈戲劇職業(yè)學(xué)院《臨床藥理學(xué)B》2023-2024學(xué)年第二學(xué)期期末試卷
- 內(nèi)蒙古能源職業(yè)學(xué)院《軟件工程專業(yè)實(shí)訓(xùn)》2023-2024學(xué)年第二學(xué)期期末試卷
- 安徽信息工程學(xué)院《氣象與生活》2023-2024學(xué)年第一學(xué)期期末試卷
- 湖北中醫(yī)藥高等??茖W(xué)校《新媒體產(chǎn)品設(shè)計(jì)與制作實(shí)訓(xùn)》2023-2024學(xué)年第二學(xué)期期末試卷
- 河南省豫東豫北十所名校2025屆高三第一次月考物理試題文試題含解析
- 常熟中學(xué)2025屆高三下第二次質(zhì)量檢查物理試題含解析
- 江西農(nóng)業(yè)大學(xué)《工程力學(xué)Ⅱ》2023-2024學(xué)年第一學(xué)期期末試卷
- 濰坊職業(yè)學(xué)院《高分子科學(xué)前沿與進(jìn)展》2023-2024學(xué)年第二學(xué)期期末試卷
- 貴州省南白中學(xué)2025屆高三下-第一次強(qiáng)化訓(xùn)練英語(yǔ)試題試卷含解析
- 供應(yīng)鏈管理與采購(gòu)制度
- (高清版)DZT 0426-2023 固體礦產(chǎn)地質(zhì)調(diào)查規(guī)范(1:50000)
- 海綿城市工程施工合同范本
- 《高溫熔融金屬吊運(yùn)安全規(guī)程》(AQ7011-2018)
- 教師命題能力培訓(xùn)
- 電機(jī)與拖動(dòng)(高職)全套教學(xué)課件
- 無人機(jī)操控技術(shù)(項(xiàng)目式 · 含工作頁(yè)) PPT 1-1 無人機(jī)概述
- 《數(shù)值分析》10.1 Euler 方法
- 汽修實(shí)訓(xùn)安全培訓(xùn)課件
- 醫(yī)學(xué)口腔科急救藥品及急救措施課件
- 土木工程無損檢測(cè)技術(shù)課件
- GB/T 22310-2023道路車輛制動(dòng)襯片盤式制動(dòng)襯塊受熱膨脹量試驗(yàn)方法
評(píng)論
0/150
提交評(píng)論