Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service

Complexity:1-14 (2017)
  Copy   BIBTEX

Abstract

With the development of mobile communication technology, location-based services are booming prosperously. Meanwhile privacy protection has become the main obstacle for the further development of LBS. The k-nearest neighbor search is one of the most common types of LBS. In this paper, we propose an efficient private circular query protocol with high accuracy rate and low computation and communication cost. We adopt the Moore curve to convert two-dimensional spatial data into one-dimensional sequence and encrypt the points of interest information with the Brakerski-Gentry-Vaikuntanathan homomorphic encryption scheme for privacy-preserving. The proposed scheme performs the secret circular shift of the encrypted POIs information to hide the location of the user without a trusted third party. To reduce the computation and communication cost, we dynamically divide the table of the POIs information according to the value of k. Experiments show that the proposed scheme provides high accuracy query results while maintaining low computation and communication cost.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,897

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Emerging Issues in Location Based Services.Claire Levallois-Barth - 2009 - Hermès: La Revue Cognition, communication, politique 53 (1).
Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
Data Science and Designing for Privacy.Michael Falgoust - 2016 - Techné: Research in Philosophy and Technology 20 (1):51-68.
Sharing private data through personalized search.Kei Karasawa - 2009 - Identity in the Information Society 2 (3):205-220.
Privacy and policy for genetic research.Judith Wagner DeCew - 2004 - Ethics and Information Technology 6 (1):5-14.
Privacy Rights: Moral and Legal Foundations.Adam D. Moore - 2010 - Pennsylvania State University Press.
Protocol‐based care: impact on roles and service delivery.Jo Rycroft-Malone, Marina Fontenla, Debra Bick & Kate Seers - 2008 - Journal of Evaluation in Clinical Practice 14 (5):867-873.
Privacy and the Right to Privacy.H. J. McCloskey - 1980 - Philosophy 55 (211):17 - 38.

Analytics

Added to PP
2017-12-22

Downloads
310 (#65,474)

6 months
290 (#7,568)

Historical graph of downloads
How can I increase my downloads?

References found in this work

No references found.

Add more references