2008 Ninth International Conference on Mobile Data Management Workshops, MDMW 2008
DOI: 10.1109/mdmw.2008.23
|View full text |Cite
|
Sign up to set email alerts
|

SPIRAL: A Scalable Private Information Retrieval Approach to Location Privacy

Abstract: Protecting users' location information in location-based services, also termed location privacy, has recently garnered significant attention due to its importance in satisfying users' privacy concerns when using location-aware services. Several approaches proposed in the literature blur the user's location in a region by increasing its spatial extent or anonymizing the user among several other users. Such approaches in nature require users to communicate through a trusted anonymizer for all of their queries wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(16 citation statements)
references
References 13 publications
0
16
0
Order By: Relevance
“…The prime shortcoming with such approaches is that different users have different privacy requirement and utility thresholds. Private Information Retrieval (PIR) techniques are also proposed to safeguard the sensitive information like location of the user [23,24]. These solutions have always been very expensive in terms of operations' computation time, communication cost, and resources needed [25].…”
Section: Related Workmentioning
confidence: 99%
“…The prime shortcoming with such approaches is that different users have different privacy requirement and utility thresholds. Private Information Retrieval (PIR) techniques are also proposed to safeguard the sensitive information like location of the user [23,24]. These solutions have always been very expensive in terms of operations' computation time, communication cost, and resources needed [25].…”
Section: Related Workmentioning
confidence: 99%
“…Authors in [7,8] introduce methods that use PIR to ensure location privacy. Most of techniques used to retrieve information privately from databases could be treated as black boxes and therefore other mapping techniques could be applied to the same PIR architecture.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the PIR-based approaches for location privacy rely on hardware-based techniques, which typically utilize a secure coprocessor (SC) at the LBS server host [2,24]. This hardware creates a computing space that is protected from the LBS, to realize query privacy.…”
Section: Pir-based Location Privacymentioning
confidence: 99%
“…This hardware creates a computing space that is protected from the LBS, to realize query privacy. A major drawback of SC-based PIR is that it requires the acquisition of specialized tamperproof hardware and it usually requires periodic reshuffling of the POIs in the database, which is a computationally expensive operation [2,26].…”
Section: Pir-based Location Privacymentioning
confidence: 99%