PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing

被引:33
|
作者
Jarvinen, Kimmo [1 ]
Leppakoski, Helena [2 ]
Lohan, Elena-Simona [2 ]
Richter, Philipp [2 ]
Schneider, Thomas [3 ]
Tkachenko, Oleksandr [3 ]
Yang, Zheng [4 ]
机构
[1] Univ Helsinki, Helsinki, Finland
[2] Tampere Univ, Tampere, Finland
[3] Tech Univ Darmstadt, Darmstadt, Germany
[4] Singapore Univ Technol & Design, Singapore, Singapore
基金
中国国家自然科学基金; 芬兰科学院;
关键词
D O I
10.1109/EuroSP.2019.00040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last decade, we observed a constantly growing number of Location-Based Services (LBSs) used in indoor environments, such as for targeted advertising in shopping malls or finding nearby friends. Although privacy-preserving LBSs were addressed in the literature, there was a lack of attention to the problem of enhancing privacy of indoor localization, i.e., the process of obtaining the users' locations indoors and, thus, a prerequisite for any indoor LBS. In this work we present PILOT, the first practically efficient solution for Privacy-Preserving Indoor Localization (PPIL) that was obtained by a synergy of the research areas indoor localization and applied cryptography. We design, implement, and evaluate protocols for Wi-Fi fingerprint-based PPIL that rely on 4 different distance metrics. To save energy and network bandwidth for the mobile end devices in PPIL, we securely outsource the computations to two non-colluding semi-honest parties. Our solution mixes different secure two-party computation protocols and we design size- and depth-optimized circuits for PPIL. We construct efficient circuit building blocks that are of independent interest: Single Instruction Multiple Data (SIMD) capable oblivious access to an array with low circuit depth and selection of the k-Nearest Neighbors with small circuit size. Additionally, we reduce Received Signal Strength (RSS) values from 8 bits to 4 bits without any significant accuracy reduction. Our most efficient PPIL protocol is 553x faster than that of Li et al. (INFOCOM'14) and 500x faster than that of Ziegeldorf et al. (WiSec'14). Our implementation on commodity hardware has practical run-times of less than 1 second even for the most accurate distance metrics that we consider, and it can process more than half a million PPIL queries per day.
引用
收藏
页码:448 / 463
页数:16
相关论文
共 50 条
  • [21] Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud
    Fu, Shaojing
    Yu, Yunpeng
    Xu, Ming
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 3 - 15
  • [22] Person Localization System Using Privacy-Preserving Sensor
    Nakashima, Shota
    Lu, Huimin
    Miyata, Kohei
    Kitazono, Yuhki
    Serikawa, Seiichi
    ADVANCES IN PRECISION INSTRUMENTATION AND MEASUREMENT, 2012, 103 : 622 - +
  • [23] DP3: A Differential Privacy-Based Privacy-Preserving Indoor Localization Mechanism
    Wang, Yufeng
    Huang, Minjie
    Jin, Qun
    Ma, Jianhua
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (12) : 2547 - 2550
  • [24] A Practical Privacy-Preserving Recommender System
    Badsha, Shahriar
    Yi, Xun
    Khalil, Ibrahim
    DATA SCIENCE AND ENGINEERING, 2016, 1 (03) : 161 - 177
  • [25] Privacy-preserving indoor localization based on inner product encryption in a cloud environment
    Wang, Zhiheng
    Xu, Yanyan
    Yan, Yuejing
    Zhang, Yiran
    Rao, Zheheng
    Ouyang, Xue
    KNOWLEDGE-BASED SYSTEMS, 2022, 239
  • [26] Practical and Privacy-Preserving TEE Migration
    Arfaoui, Ghada
    Gharout, Said
    Lalande, Jean-Francois
    Traore, Jacques
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2015, 2015, 9311 : 153 - 168
  • [27] Towards practical privacy-preserving protocols
    Demmler, Daniel
    IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 49 - 53
  • [28] A Practical and Scalable Privacy-preserving Framework
    Avgerinos, Nikos
    D'Antonio, Salvatore
    Kamara, Irene
    Kotselidis, Christos
    Lazarou, Ioannis
    Mannarino, Teresa
    Meditskos, Georgios
    Papachristopoulou, Konstantina
    Papoutsis, Angelos
    Roccetti, Paolo
    Zuber, Martin
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 598 - 603
  • [29] Practical Privacy-Preserving Authentication for SSH
    Roy, Lawrence
    Lyakhov, Stanislav
    Jang, Yeongjin
    Rosulek, Mike
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3345 - 3362
  • [30] Maximized Privacy-Preserving Outsourcing on Support Vector Clustering
    Ping, Yuan
    Hao, Bin
    Hei, Xiali
    Wu, Jie
    Wang, Baocang
    ELECTRONICS, 2020, 9 (01)