Abstract

The inherent challenge within the domain of location-based services is finding a delicate balance between user privacy and the efficiency of answering queries. Inevitably, security issues can and will arise as the server must be informed about the query location in order to provide accurate responses. Despite the many security advancements in wireless communication, servers may become jeopardized or become infected with malicious software. That said, it is possible to ensure queries do not generate fake responses that appear real; in fact, if a fake response is used, mechanisms can be employed for the user to identify the query’s authenticity. Towards this end, the paper propose BLoom Filter Oblivious Transfer (BLOT), a novel phase privacy preserving framework for LBS that combines a Bloom filter hash function and the oblivious transfer protocol. These methods are shown to be useful in securing a user’s private information. An analysis of the results revealed that BLOT performed markedly better and enhanced entropy when compared to referenced approaches.

Highlights

  • Owing to the proliferation of smartphones and similar mobile devices, location-based services (LBS) have found widespread use in recent years

  • This paper describes a new approach for LBS applications that provides a user with three security guarantees: (a) it will take at least Q1 queries for an eavesdropper to learn a single bit of information from the protocol exchange; (b) it will take at least Q2 queries for a malicious LBS provider to learn a single bit of information from the protocol exchange; and (c) the information leaked by the database handling the LBS information is at most Q3 bits for each query

  • The total number of information exchanges in BLoom Filter Oblivious Transfer (BLOT) is around 960 bits as per simulation, which is much smaller than that of BMobishare

Read more

Summary

INTRODUCTION

Owing to the proliferation of smartphones and similar mobile devices, location-based services (LBS) have found widespread use in recent years. While proven and demonstrated to be profoundly helpful, the inherent challenge of location-based services is one of juggling between two seemingly diametrically opposed requirements: user privacy and security and the efficiency of server response times when answering user queries. LBS queries submitted by users must be efficient but must ensure privacy; such queries often lead to security issues. The ultimate objective is to ensure the efficiency and privacy of LBS and their queries This requirement raises questions regarding the security of servers in general and that of LBS in particular. They examined the current problems of location sharing and proposed BMobishare as an enhanced security mechanism that ensures location privacy They employed the Bloom filter to provide greater security for sensitive data compared to other existing methods. A persuasive argument can be made that these diverse protocols can be successfully combined to yield solutions that are stronger than any individual approach

RELATED WORK
Deficiency of BMobishare
Oblivious Transfer Scenario in LBS
Bloom Filter Scenario in LBS
BLOT Overview in LBS
Security for LBS
BLOT System Architecture
OT Standard
BLOT Querying Friends‟ Locations
Bloom Filter Stage BL
OT Stage
BLOT PERFORMANCE MEASURES
PERFORMANCE ENTROPY CALCULATION OF BMOBISHARE
Service Registration and Authentication
Query a Friend‟s Location
ANALYSIS OF RESULTS AND DISCUSSION
VIII. PERFORMANCE RESULTS
Computing Performance
Computing Performance Measurement
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call