Shortest Path Computation with No Information Leakage
Shortest path computation is one of the most common queries in location-based services (LBSs). Although particularly useful, such queries raise serious privacy concerns. Exposing to a (potentially untrusted) LBS the client’s position and her destination may reveal personal information, such as socia...
Saved in:
Main Authors: | , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2012
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1488 https://ink.library.smu.edu.sg/context/sis_research/article/2487/viewcontent/VLDB12_PIRsp.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2487 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-24872016-05-03T07:08:04Z Shortest Path Computation with No Information Leakage MOURATIDIS, Kyriakos YIU, Man Lung Shortest path computation is one of the most common queries in location-based services (LBSs). Although particularly useful, such queries raise serious privacy concerns. Exposing to a (potentially untrusted) LBS the client’s position and her destination may reveal personal information, such as social habits, health condition, shopping preferences, lifestyle choices, etc. The only existing method for privacy-preserving shortest path computation follows the obfuscation paradigm; it prevents the LBS from inferring the source and destination of the query with a probability higher than a threshold. This implies, however, that the LBS still deduces some information (albeit not exact) about the client’s location and her destination. In this paper we aim at strong privacy, where the adversary learns nothing about the shortest path query. We achieve this via established PIR techniques, which we treat as black-box building blocks. Experiments on real, large-scale road networks verify the efficiency and practicality of our schemes. 2012-08-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1488 info:doi/10.14778/2212351.2212352 https://ink.library.smu.edu.sg/context/sis_research/article/2487/viewcontent/VLDB12_PIRsp.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Black boxes Building blockes Health condition Information leakage Lifestyle choices Personal information Privacy concerns Privacy preserving Private information retrieval Road network Shortest path Shortest path computations Databases and Information Systems Numerical Analysis and Scientific Computing |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Black boxes Building blockes Health condition Information leakage Lifestyle choices Personal information Privacy concerns Privacy preserving Private information retrieval Road network Shortest path Shortest path computations Databases and Information Systems Numerical Analysis and Scientific Computing |
spellingShingle |
Black boxes Building blockes Health condition Information leakage Lifestyle choices Personal information Privacy concerns Privacy preserving Private information retrieval Road network Shortest path Shortest path computations Databases and Information Systems Numerical Analysis and Scientific Computing MOURATIDIS, Kyriakos YIU, Man Lung Shortest Path Computation with No Information Leakage |
description |
Shortest path computation is one of the most common queries in location-based services (LBSs). Although particularly useful, such queries raise serious privacy concerns. Exposing to a (potentially untrusted) LBS the client’s position and her destination may reveal personal information, such as social habits, health condition, shopping preferences, lifestyle choices, etc. The only existing method for privacy-preserving shortest path computation follows the obfuscation paradigm; it prevents the LBS from inferring the source and destination of the query with a probability higher than a threshold. This implies, however, that the LBS still deduces some information (albeit not exact) about the client’s location and her destination. In this paper we aim at strong privacy, where the adversary learns nothing about the shortest path query. We achieve this via established PIR techniques, which we treat as black-box building blocks. Experiments on real, large-scale road networks verify the efficiency and practicality of our schemes. |
format |
text |
author |
MOURATIDIS, Kyriakos YIU, Man Lung |
author_facet |
MOURATIDIS, Kyriakos YIU, Man Lung |
author_sort |
MOURATIDIS, Kyriakos |
title |
Shortest Path Computation with No Information Leakage |
title_short |
Shortest Path Computation with No Information Leakage |
title_full |
Shortest Path Computation with No Information Leakage |
title_fullStr |
Shortest Path Computation with No Information Leakage |
title_full_unstemmed |
Shortest Path Computation with No Information Leakage |
title_sort |
shortest path computation with no information leakage |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2012 |
url |
https://ink.library.smu.edu.sg/sis_research/1488 https://ink.library.smu.edu.sg/context/sis_research/article/2487/viewcontent/VLDB12_PIRsp.pdf |
_version_ |
1770571201773568000 |