2017
DOI: 10.5815/ijcnis.2017.08.05
|View full text |Cite
|
Sign up to set email alerts
|

Location Privacy using Homomorphic Encryption over Cloud

Abstract: Abstract-Homomorphism is a concept that allows one to perform arbitrary calculations on the cipher text. One of the application of this concept is securing one's location while one uses location based services(LBS). In this paper I have discussed an approach to preserve mobile user's location while accessing some location based service. The mobile user is trying to find the nearest locations of his interest using a mobile application. While doing so he wishes to keep his location coordinates a secret from the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
7
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 6 publications
1
7
0
Order By: Relevance
“…Homomorphic Encryption As has been explained in previous chapters the advantage of homomorphic encryption is that data can be computed while it is encrypted, guaranteeing that computations on the data lead to the same results on the decrypted data. Rohilla et al [52] provide a prototype, showing how location privacy using homomorphic encryption over the cloud cold be realized. But distinctly from our use case, they assume only one person requesting a location-based service.…”
Section: Randomizationmentioning
confidence: 99%
“…Homomorphic Encryption As has been explained in previous chapters the advantage of homomorphic encryption is that data can be computed while it is encrypted, guaranteeing that computations on the data lead to the same results on the decrypted data. Rohilla et al [52] provide a prototype, showing how location privacy using homomorphic encryption over the cloud cold be realized. But distinctly from our use case, they assume only one person requesting a location-based service.…”
Section: Randomizationmentioning
confidence: 99%
“…e server answers queries based on the transformed data other than the original data. Some approaches use cryptography [22][23][24] like homomorphic encryption [8,14] to encrypt the data of the users and enable queries on encrypted data. ese approaches avoid transmitting the original user data during the process of the query, thus protecting the user privacy, but they do not consider the privacy leakage from the query results, which motivated the attack proposed in this paper.…”
Section: 2mentioning
confidence: 99%
“…In this protocol, we use a fully homomorphic encryption (FHE) [88]. This technique is detailed in [89,90]. We repeat all the steps (excluding the last one) from the protocol of vehicle-side distance calculation, shifting this calculation to the side of the base station.…”
Section: Location Determination With Mutual Base Station Authenticmentioning
confidence: 99%