PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing

被引:33
|
作者
Jarvinen, Kimmo [1 ]
Leppakoski, Helena [2 ]
Lohan, Elena-Simona [2 ]
Richter, Philipp [2 ]
Schneider, Thomas [3 ]
Tkachenko, Oleksandr [3 ]
Yang, Zheng [4 ]
机构
[1] Univ Helsinki, Helsinki, Finland
[2] Tampere Univ, Tampere, Finland
[3] Tech Univ Darmstadt, Darmstadt, Germany
[4] Singapore Univ Technol & Design, Singapore, Singapore
基金
中国国家自然科学基金; 芬兰科学院;
关键词
D O I
10.1109/EuroSP.2019.00040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last decade, we observed a constantly growing number of Location-Based Services (LBSs) used in indoor environments, such as for targeted advertising in shopping malls or finding nearby friends. Although privacy-preserving LBSs were addressed in the literature, there was a lack of attention to the problem of enhancing privacy of indoor localization, i.e., the process of obtaining the users' locations indoors and, thus, a prerequisite for any indoor LBS. In this work we present PILOT, the first practically efficient solution for Privacy-Preserving Indoor Localization (PPIL) that was obtained by a synergy of the research areas indoor localization and applied cryptography. We design, implement, and evaluate protocols for Wi-Fi fingerprint-based PPIL that rely on 4 different distance metrics. To save energy and network bandwidth for the mobile end devices in PPIL, we securely outsource the computations to two non-colluding semi-honest parties. Our solution mixes different secure two-party computation protocols and we design size- and depth-optimized circuits for PPIL. We construct efficient circuit building blocks that are of independent interest: Single Instruction Multiple Data (SIMD) capable oblivious access to an array with low circuit depth and selection of the k-Nearest Neighbors with small circuit size. Additionally, we reduce Received Signal Strength (RSS) values from 8 bits to 4 bits without any significant accuracy reduction. Our most efficient PPIL protocol is 553x faster than that of Li et al. (INFOCOM'14) and 500x faster than that of Ziegeldorf et al. (WiSec'14). Our implementation on commodity hardware has practical run-times of less than 1 second even for the most accurate distance metrics that we consider, and it can process more than half a million PPIL queries per day.
引用
收藏
页码:448 / 463
页数:16
相关论文
共 50 条
  • [31] Privacy-preserving logistic regression outsourcing in cloud computing
    Zhu, Xu Dong
    Li, Hui
    Li, Feng Hua
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 144 - 150
  • [32] A Privacy-Preserving Principal Component Analysis Outsourcing Framework
    Liu, Xinbo
    Lin, Yaping
    Liu, Qin
    Yao, Xin
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1354 - 1359
  • [33] CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas
    Dimitriou, Tassos
    Alhamdan, Khazam
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1060 - 1067
  • [34] Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
    Schoenmakers, Berry
    Veeningen, Meilof
    de Vreede, Niels
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 346 - 366
  • [35] Privacy-preserving Outsourcing of Image Global Feature Detection
    Qin, Zhan
    Yan, Jingbo
    Ren, Kui
    Chen, Chang Wen
    Wang, Cong
    Fu, Xinwen
    2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 710 - 715
  • [36] Practical Privacy-Preserving Medical Diagnosis using Homomorphic Encryption
    Carpov, Sergiu
    Thanh Hai Nguyen
    Sirdey, Renaud
    Constantino, Gianpiero
    Martinelli, Fabio
    PROCEEDINGS OF 2016 IEEE 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2016, : 593 - 599
  • [37] A Practical System for Privacy-Preserving Collaborative Filtering
    Chow, Richard
    Pathak, Manas A.
    Wang, Cong
    12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2012), 2012, : 547 - 554
  • [38] Privacy-preserving Practical Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Chen, Zhili
    Li, Lingjun
    Yu, Zhenshan
    Luo, Yonglong
    FCST: 2008 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2008, : 10 - 16
  • [39] A Practical Privacy-Preserving Algorithm for Document Data
    Mimoto, Tomoaki
    Kiyomoto, Shinsaku
    Kitamura, Koji
    Miyaji, Atsuko
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1377 - 1384
  • [40] Toward practical privacy-preserving linear regression
    Xu, Wenju
    Wang, Baocang
    Liu, Jiasen
    Chen, Yange
    Duan, Pu
    Hong, Zhiyong
    INFORMATION SCIENCES, 2022, 596 (119-136) : 119 - 136