Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Preserving Location Privacy in Geosocial Allpicatons
Transcript of Preserving Location Privacy in Geosocial Allpicatons
Scenarios and Requirements
Alice and friends playing location based games
Scenarios and Requirements
Alice and friends uses friend referral and recommendations
Track users movements
Each User U in the system chooses set of secretes containing Rotation angle Theta u, a shift bu, and a symmetric key symmu.
Users shares their secrets with friends through trusted channels.
Strong Location Privacy
Location and user unlinkability
Location data privacy
Prior Work on Privacy
Relaying on trusted servers
Terminology and Attacker Model
System and Attacker Model
Overview of LocX
Mapping from transformed Location to an encrypted index, i(called L2I)
Mapping from index to encrypted data(called I2D)
Decoupling Data from it's Location
In LocX (x,y) -> (x',y')
data(x,y) -> E(data(x,y))
L2I = [(x',y'),E(i)]
I2D = [i,E(data(x,y))]
User decouples the location data to L2I and I2D
Then user store L2I on index server
Then user store I2D on data server
Storing L2I on the index server
User transform (x,y) into (x',y') using Thetau and Bu
Transformation preserve the points between points.
User generates random index i and encrypts to Esymmu(i)
Then stores L2I = [(x',y'), E(symmu(i))]
Storing I2D on data server
User store I2D = [i,E(data)]
Data server only see the index and
corresponding encrypted data
Maintains Location privacy and efficiency
User takes location coordinates and transforms it according to all his/her friends secretes.
User send query containing all transformed coordinates into index server via proxy
Index server fetches all data all the L2I's at corresponding location and decrypts them.
Then queries the data server for I2D's
Privacy while querying data from index server
Adding nose to the query
After receiving the I2L's user filter out the noise
Securely identifying the L2I's of friends
Adding an L2I to each user before sending them to index server
Then user submit list of ID's he/she cares about.
This reduces privacy
Improving efficiency and privacy
User ID tags
Keyed Hash tags
Applications can be developed using LocX API
Location based reminder
Location based recommendations
LocX provides privacy for users without injecting uncertainty or errors into the system
LocX provides efficiency and reliability
Preserving Location privacy in Geosocial Application