kth.sePublications KTH
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Resilient collaborative privacy for Location-Based services
KTH, School of Electrical Engineering (EES), Communication Networks.ORCID iD: 0000-0003-2022-3976
KTH, School of Electrical Engineering (EES), Communication Networks.ORCID iD: 0000-0002-3267-5374
2015 (English)In: 20th Nordic Conference on Secure IT Systems, NordSec 2015, Springer, 2015, p. 47-63Conference paper, Published paper (Refereed)
Resource type
Text
Abstract [en]

Location-based Services (LBSs) provide valuable services, with convenient features for users. However, the information disclosed through each request harms user privacy. This is a concern particularly with honest-but-curious LBS servers, which could, by collecting requests, track users and infer additional sensitive user data. This is the motivation of both centralized and decentralized location privacy protection schemes for LBSs: anonymizing and obfuscating LBS queries to not disclose exact information, while still getting useful responses. Decentralized schemes overcome the disadvantages of centralized schemes, eliminating anonymizers and enhancing users’ control over sensitive information. However, an insecure decentralized system could pose even more serious security threats than privacy leakage. We address exactly this problem, by proposing security enhancements for mobile data sharing systems. We protect user privacy while preserving accountability of user activities, leveraging pseudonymous authentication with mainstream cryptography. Our design leverages architectures proposed for large scale mobile systems, while it incurs minimal changes to LBS servers as it can be deployed in parallel to the LBS servers. This further motivates the adoption of our design, in order to cater to the needs of privacy-sensitive users. We provide an analysis of security and privacy concerns and countermeasures, as well as a performance evaluation of basic protocol operations showing the practicality of our design.

Place, publisher, year, edition, pages
Springer, 2015. p. 47-63
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 9417
Keywords [en]
Location-based service, Pseudonymous authentication, Security and privacy, Authentication, Data privacy, Encoding (symbols), Error analysis, Knowledge based systems, Location, Mobile devices, Telecommunication services, Basic protocols, Decentralized system, Location privacy protection, Privacy leakages, Security enhancements, Security threats, Sensitive informations, Location based services
National Category
Human Computer Interaction Computer Sciences Communication Systems
Identifiers
URN: urn:nbn:se:kth:diva-181644DOI: 10.1007/978-3-319-26502-5_4ISI: 000374098500004Scopus ID: 2-s2.0-84951871619ISBN: 9783319265018 (print)OAI: oai:DiVA.org:kth-181644DiVA, id: diva2:909470
Conference
19 October 2015 through 21 October 2015
Note

QC 20160307

Available from: 2016-03-07 Created: 2016-02-02 Last updated: 2024-03-18Bibliographically approved
In thesis
1. Cooperative Privacy and Security for Mobile Systems
Open this publication in new window or tab >>Cooperative Privacy and Security for Mobile Systems
2020 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The growing popularity of powerful mobile devices, along with increased computation and storage of computing infrastructure, opened possibilities for versatile mobile system applications. Users, leveraging sensing capabilities of the devices, can collect rich data and exchange the data with diverse Service Providers (SPs) or their close neighboring devices. Provision of such user status awareness to the involved system entities, can facilitate customized user experience for system participants.

Nonetheless, the open and decentralized nature of mobile systems raise concerns on both security and privacy of users and the system infrastructure. Sensitive user data could be exposed to honest-but-curious entities, which can further process data to profile users. At the same time, compromised system entities can feed faulty data to disrupt system functionalities or mislead users. Such issues necessitate secure and privacy-enhancing mobile systems, while not compromising the quality of service the systems provide to their users. More specifically, the solutions should be efficient and scale as the system grows, and resilient to both external and internal adversaries. This thesis considers two mobile system instances: Location-based Services (LBSs) and Vehicle-to-Vehicle (V2V) safety applications. We address security and privacy in a cooperative manner, relying on cooperation among the users to protect themselves against the adversaries. Due to the reliance on peers, input from the peers should be examined, in order to ensure the reli- ability of the applications. We adapt pseudonymous authentication, designed for Vehicular Communication (VC) systems, and integrate it with LBSs. This protects user privacy and holds users accountable for their actions, which are non-repudiable. At the same time, our scheme prevents malicious nodes from aggressively passing on bogus data. We leverage redundancy of shared data from multiple cooperating nodes to detect potential conflicts. Any conflict triggers proactive checking on the data with the authoritative entity that reveals the actual misbehaving users. For V2V safety applications, we extend safety beacons, i.e., Cooperative Awareness Messages (CAMs), to share signature verification effort, for more efficient message verification. Similarly to the LBSs, redundancy of such piggybacked claims is also key for remedying malicious nodes that abuse this cooperative verification. In addition, the extended beacon format facilitates verification of event-driven messages, including Decentralized Environmental Notification Messages (DENMs), leveraging proactive authenticator distribution.

We qualitatively and quantitatively evaluate achieved security and privacy protection. The latter is based on extensive simulation results. We propose a location privacy metric to capture the achieved protection for LBSs, taking into consideration the pseudonymous authentication. The performance of the privacy-enhancing LBS is experimentally evaluated with the help of an implementation on a small scale automotive computer testbed. We embed processing delays and queue management for message processing in simulations of V2V communication, to show scalability and efficiency of the resilient V2V communication scheme. The results confirm the resilience to both internal and external adversaries for the both systems.

Place, publisher, year, edition, pages
Stockholm: KTH Royal Institute of Technology, 2020. p. 48
Series
TRITA-EECS-AVL ; 2020:33
National Category
Communication Systems
Research subject
Electrical Engineering
Identifiers
urn:nbn:se:kth:diva-273637 (URN)978-91-7873-565-5 (ISBN)
Public defence
2020-06-15, https://kth-se.zoom.us/webinar/register/WN_WLb9GyXjRD2hY9sCg9I_nQ, 09:30 (English)
Opponent
Supervisors
Note

QC 20200523

Available from: 2020-05-23 Created: 2020-05-22 Last updated: 2022-06-26Bibliographically approved

Open Access in DiVA

fulltext(571 kB)203 downloads
File information
File name FULLTEXT02.pdfFile size 571 kBChecksum SHA-512
4c94c527ee00ad4ac47c779c8913c8cd7a5b8c50f7e976a497ccb9ca9dc68376c8927d20498b01710039559859b1f069af199936d0e62fca067bbde79839cfa2
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Jin, HongyuPapadimitratos, Panagiotis

Search in DiVA

By author/editor
Jin, HongyuPapadimitratos, Panagiotis
By organisation
Communication Networks
Human Computer InteractionComputer SciencesCommunication Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 204 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 451 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf