Computationally private information retrieval (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Journal of the ACM (JACM)
Oblivious transfer and polynomial evaluation
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Symmetrically Private Information Retrieval
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Replication is not needed: single database, computationally-private information retrieval
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Protecting Client Privacy with Trusted Computing at the Server
IEEE Security and Privacy
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Improving the Robustness of Private Information Retrieval
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Robust Information-Theoretic Private Information Retrieval
Journal of Cryptology
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Supporting anonymous location queries in mobile environments with privacygrid
Proceedings of the 17th international conference on World Wide Web
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Understanding the privacy-efficiency trade-off in location based queries
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Position transformation: a location privacy protection method for moving objects
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
SPIRAL: A Scalable Private Information Retrieval Approach to Location Privacy
MDMW '08 Proceedings of the 2008 Ninth International Conference on Mobile Data Management Workshops
Hiding Location Information from Location-Based Services
MDM '07 Proceedings of the 2007 International Conference on Mobile Data Management
A Hybrid Technique for Private Location-Based Queries with Database Protection
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
CAP: A Context-Aware Privacy Protection System for Location-Based Services
ICDCS '09 Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems
A distributed k-anonymity protocol for location privacy
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
Privacy in Location-Based Applications: Research Issues and Emerging Trends
Privacy in Location-Based Applications: Research Issues and Emerging Trends
Privacy in Georeferenced Context-Aware Services: A Survey
Privacy in Location-Based Applications
Cybercasing the joint: on the privacy implications of geo-tagging
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Caché: caching location-enhanced content to improve user privacy
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Collaborative location privacy with rational users
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
Secure data management in the cloud
DNIS'11 Proceedings of the 7th international conference on Databases in Networked Information Systems
The shy mayor: private badges in geosocial networks
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Optimally robust private information retrieval
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Toward preserving privacy and functionality in geosocial networks
Proceedings of the 19th annual international conference on Mobile computing & networking
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Privacy Preserving Cloud-Based Computing Platform (PPCCP) for Using Location Based Services
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
Towards practical private processing of database queries over public data
Distributed and Parallel Databases
Hi-index | 0.00 |
Mobile smartphone users frequently need to search for nearby points of interest from a location based service, but in a way that preserves the privacy of the users' locations. We present a technique for private information retrieval that allows a user to retrieve information from a database server without revealing what is actually being retrieved from the server. We perform the retrieval operation in a computationally efficient manner to make it practical for resource-constrained hardware such as smartphones, which have limited processing power, memory, and wireless bandwidth. In particular, our algorithm makes use of a variable-sized cloaking region that increases the location privacy of the user at the cost of additional computation, but maintains the same traffic cost. Our proposal does not require the use of a trusted third-party component, and ensures that we find a good compromise between user privacy and computational efficiency. We evaluated our approach with a proof-of-concept implementation over a commercial-grade database of points of interest. We also measured the performance of our query technique on a smartphone and wireless network.