PILOT: Practical Privacy-Preserving Indoor Localization using OuTsourcing

被引:33
|
作者
Jarvinen, Kimmo [1 ]
Leppakoski, Helena [2 ]
Lohan, Elena-Simona [2 ]
Richter, Philipp [2 ]
Schneider, Thomas [3 ]
Tkachenko, Oleksandr [3 ]
Yang, Zheng [4 ]
机构
[1] Univ Helsinki, Helsinki, Finland
[2] Tampere Univ, Tampere, Finland
[3] Tech Univ Darmstadt, Darmstadt, Germany
[4] Singapore Univ Technol & Design, Singapore, Singapore
基金
中国国家自然科学基金; 芬兰科学院;
关键词
D O I
10.1109/EuroSP.2019.00040
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last decade, we observed a constantly growing number of Location-Based Services (LBSs) used in indoor environments, such as for targeted advertising in shopping malls or finding nearby friends. Although privacy-preserving LBSs were addressed in the literature, there was a lack of attention to the problem of enhancing privacy of indoor localization, i.e., the process of obtaining the users' locations indoors and, thus, a prerequisite for any indoor LBS. In this work we present PILOT, the first practically efficient solution for Privacy-Preserving Indoor Localization (PPIL) that was obtained by a synergy of the research areas indoor localization and applied cryptography. We design, implement, and evaluate protocols for Wi-Fi fingerprint-based PPIL that rely on 4 different distance metrics. To save energy and network bandwidth for the mobile end devices in PPIL, we securely outsource the computations to two non-colluding semi-honest parties. Our solution mixes different secure two-party computation protocols and we design size- and depth-optimized circuits for PPIL. We construct efficient circuit building blocks that are of independent interest: Single Instruction Multiple Data (SIMD) capable oblivious access to an array with low circuit depth and selection of the k-Nearest Neighbors with small circuit size. Additionally, we reduce Received Signal Strength (RSS) values from 8 bits to 4 bits without any significant accuracy reduction. Our most efficient PPIL protocol is 553x faster than that of Li et al. (INFOCOM'14) and 500x faster than that of Ziegeldorf et al. (WiSec'14). Our implementation on commodity hardware has practical run-times of less than 1 second even for the most accurate distance metrics that we consider, and it can process more than half a million PPIL queries per day.
引用
收藏
页码:448 / 463
页数:16
相关论文
共 50 条
  • [41] Practical Verifiable & Privacy-Preserving Double Auctions
    Zahedani, Armin Memar
    Vos, Jelle
    Erkin, Zekeriya
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [42] Practical Privacy-Preserving Protocols for Criminal Investigations
    Kerschbaum, Florian
    Schaad, Andreas
    Biswas, Debmalya
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 197 - 199
  • [43] A Practical Framework for Privacy-Preserving Data Analytics
    Fan, Liyue
    Jin, Hongxia
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW 2015), 2015, : 311 - 321
  • [44] Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework
    Liu, Jiao
    Li, Xinghua
    Liu, Ximeng
    Tang, Jiawei
    Wang, Yunwei
    Tong, Qiuyun
    Ma, Jianfeng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 4591 - 4604
  • [45] Analysis of Privacy-Preserving Mechanisms for Outsourcing Data Mining Tasks
    Chiew, Kevin
    Qin, Shaowen
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12542 - +
  • [46] Privacy-preserving and Verifiable Outsourcing Inference Against Malicious Servers
    Liu, Yiyao
    Li, Hongwei
    Hao, Meng
    Zhang, Xilin
    Hu, Guiqiang
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 5001 - 5006
  • [47] Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted Domain
    Zhang, Yonghong
    Zheng, Peijia
    Luo, Weiqi
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 389 - 396
  • [48] On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification
    Li, Xingxin
    Zhu, Youwen
    Wang, Jian
    Liu, Zhe
    Liu, Yining
    Zhang, Mingwu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (05) : 906 - 912
  • [49] A Practical System for Privacy-Preserving Video Surveillance
    Bentafat, Elmahdi
    Rathore, M. Mazhar
    Bakiras, Spiridon
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT II, 2020, 12147 : 21 - 39
  • [50] A Practical Framework for Privacy-Preserving NoSQL Databases
    Macedo, Ricardo
    Paulo, Joao
    Pontes, Rogerio
    Portela, Bernardo
    Oliveira, Tiago
    Matos, Miguel
    Oliveira, Rui
    2017 IEEE 36TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2017, : 11 - 20