Shortest Path Computation with No Information Leakage

Shortest path computation is one of the most common queries in location-based services (LBSs). Although particularly useful, such queries raise serious privacy concerns. Exposing to a (potentially untrusted) LBS the client’s position and her destination may reveal personal information, such as socia...

Full description

Saved in:
Bibliographic Details
Main Authors: MOURATIDIS, Kyriakos, YIU, Man Lung
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2012
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1488
https://ink.library.smu.edu.sg/context/sis_research/article/2487/viewcontent/VLDB12_PIRsp.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2487
record_format dspace
spelling sg-smu-ink.sis_research-24872016-05-03T07:08:04Z Shortest Path Computation with No Information Leakage MOURATIDIS, Kyriakos YIU, Man Lung Shortest path computation is one of the most common queries in location-based services (LBSs). Although particularly useful, such queries raise serious privacy concerns. Exposing to a (potentially untrusted) LBS the client’s position and her destination may reveal personal information, such as social habits, health condition, shopping preferences, lifestyle choices, etc. The only existing method for privacy-preserving shortest path computation follows the obfuscation paradigm; it prevents the LBS from inferring the source and destination of the query with a probability higher than a threshold. This implies, however, that the LBS still deduces some information (albeit not exact) about the client’s location and her destination. In this paper we aim at strong privacy, where the adversary learns nothing about the shortest path query. We achieve this via established PIR techniques, which we treat as black-box building blocks. Experiments on real, large-scale road networks verify the efficiency and practicality of our schemes. 2012-08-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1488 info:doi/10.14778/2212351.2212352 https://ink.library.smu.edu.sg/context/sis_research/article/2487/viewcontent/VLDB12_PIRsp.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Black boxes Building blockes Health condition Information leakage Lifestyle choices Personal information Privacy concerns Privacy preserving Private information retrieval Road network Shortest path Shortest path computations Databases and Information Systems Numerical Analysis and Scientific Computing
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Black boxes
Building blockes
Health condition
Information leakage
Lifestyle choices
Personal information
Privacy concerns
Privacy preserving
Private information retrieval
Road network
Shortest path
Shortest path computations
Databases and Information Systems
Numerical Analysis and Scientific Computing
spellingShingle Black boxes
Building blockes
Health condition
Information leakage
Lifestyle choices
Personal information
Privacy concerns
Privacy preserving
Private information retrieval
Road network
Shortest path
Shortest path computations
Databases and Information Systems
Numerical Analysis and Scientific Computing
MOURATIDIS, Kyriakos
YIU, Man Lung
Shortest Path Computation with No Information Leakage
description Shortest path computation is one of the most common queries in location-based services (LBSs). Although particularly useful, such queries raise serious privacy concerns. Exposing to a (potentially untrusted) LBS the client’s position and her destination may reveal personal information, such as social habits, health condition, shopping preferences, lifestyle choices, etc. The only existing method for privacy-preserving shortest path computation follows the obfuscation paradigm; it prevents the LBS from inferring the source and destination of the query with a probability higher than a threshold. This implies, however, that the LBS still deduces some information (albeit not exact) about the client’s location and her destination. In this paper we aim at strong privacy, where the adversary learns nothing about the shortest path query. We achieve this via established PIR techniques, which we treat as black-box building blocks. Experiments on real, large-scale road networks verify the efficiency and practicality of our schemes.
format text
author MOURATIDIS, Kyriakos
YIU, Man Lung
author_facet MOURATIDIS, Kyriakos
YIU, Man Lung
author_sort MOURATIDIS, Kyriakos
title Shortest Path Computation with No Information Leakage
title_short Shortest Path Computation with No Information Leakage
title_full Shortest Path Computation with No Information Leakage
title_fullStr Shortest Path Computation with No Information Leakage
title_full_unstemmed Shortest Path Computation with No Information Leakage
title_sort shortest path computation with no information leakage
publisher Institutional Knowledge at Singapore Management University
publishDate 2012
url https://ink.library.smu.edu.sg/sis_research/1488
https://ink.library.smu.edu.sg/context/sis_research/article/2487/viewcontent/VLDB12_PIRsp.pdf
_version_ 1770571201773568000