Privacy-Preserving Aggregate Queries for Optimal Location Selection

Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of the time. Other businesses also want to use this information for location analytics, such as finding the optimal location for a new branch. Ho...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on dependable and secure computing Jg. 16; H. 2; S. 329 - 343
Hauptverfasser: Yilmaz, Emre, Ferhatosmanoglu, Hakan, Ayday, Erman, Aksoy, Remzi Can
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Washington IEEE 01.03.2019
IEEE Computer Society
Schlagworte:
ISSN:1545-5971, 1941-0018
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of the time. Other businesses also want to use this information for location analytics, such as finding the optimal location for a new branch. However, location data owners cannot share their data with other businesses, mainly due to privacy and legal concerns. In this paper, we propose privacy-preserving solutions in which location-based queries can be answered by data owners without sharing their data with other businesses and without accessing sensitive information such as the customer list of the businesses that send the query. We utilize a partially homomorphic cryptosystem as the building block of the proposed protocols. We prove the security of the protocols in semi-honest threat model. We also explain how to achieve differential privacy in the proposed protocols and discuss its impact on utility. We evaluate the performance of the protocols with real and synthetic datasets and show that the proposed solutions are highly practical. The proposed solutions will facilitate an effective sharing of sensitive data between entities and joint analytics in a wide range of applications without violating their customers' privacy.
AbstractList Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of the time. Other businesses also want to use this information for location analytics, such as finding the optimal location for a new branch. However, location data owners cannot share their data with other businesses, mainly due to privacy and legal concerns. In this paper, we propose privacy-preserving solutions in which location-based queries can be answered by data owners without sharing their data with other businesses and without accessing sensitive information such as the customer list of the businesses that send the query. We utilize a partially homomorphic cryptosystem as the building block of the proposed protocols. We prove the security of the protocols in semi-honest threat model. We also explain how to achieve differential privacy in the proposed protocols and discuss its impact on utility. We evaluate the performance of the protocols with real and synthetic datasets and show that the proposed solutions are highly practical. The proposed solutions will facilitate an effective sharing of sensitive data between entities and joint analytics in a wide range of applications without violating their customers’ privacy.
Author Yilmaz, Emre
Ayday, Erman
Aksoy, Remzi Can
Ferhatosmanoglu, Hakan
Author_xml – sequence: 1
  givenname: Emre
  orcidid: 0000-0003-0834-8805
  surname: Yilmaz
  fullname: Yilmaz, Emre
  email: emre.yilmaz@cs.bilkent.edu.tr
  organization: Computer Engineering Department, Bilkent University, Ankara, Turkey
– sequence: 2
  givenname: Hakan
  surname: Ferhatosmanoglu
  fullname: Ferhatosmanoglu, Hakan
  email: hakan.f@warwick.ac.uk
  organization: Department of Computer Science, University of Warwick, Coventry, UK
– sequence: 3
  givenname: Erman
  orcidid: 0000-0003-3383-1081
  surname: Ayday
  fullname: Ayday, Erman
  email: erman@cs.bilkent.edu.tr
  organization: Computer Engineering Department, Bilkent University, Ankara, Turkey
– sequence: 4
  givenname: Remzi Can
  surname: Aksoy
  fullname: Aksoy, Remzi Can
  email: remzican@umich.edu
  organization: Bilkent University, Ankara, Turkey
BookMark eNp9kE9PwkAQxTcGEwH9AMZLE8_F3e52_xxJFTUhAQOeN8t22iypLe4WEr69LRAPHpzLzOH9Zua9ERrUTQ0I3RM8IQSrp_XzKpskmIhJwhVVkl-hIVGMxBgTOejmlKVxqgS5QaMQthgnTCo2RNnSu4Oxx3jpIYA_uLqMpmXpoTQtRB978A5CVDQ-Wuxa92WqaN5Y07qmjlZQge2nW3RdmCrA3aWP0efsZZ29xfPF63s2ncc2UbSNqZHphhU5Y8RYUygqcCKswYWg0so058Ap47YrQTc5x4paYplhGypyrgpOx-jxvHfnm-89hFZvm72vu5M6IYqcjONOJc4q65sQPBTauvb0ceuNqzTBuk9M94npPjF9SawjyR9y5zvL_vgv83BmHAD86oVUMiWY_gCt-Xjc
CODEN ITDSCM
CitedBy_id crossref_primary_10_1109_JIOT_2023_3307478
crossref_primary_10_1007_s11227_022_04601_5
crossref_primary_10_1155_2020_8895281
crossref_primary_10_1515_libri_2019_0140
crossref_primary_10_3390_app15031641
crossref_primary_10_1145_3423165
crossref_primary_10_1016_j_knosys_2021_106952
crossref_primary_10_1145_3617589
crossref_primary_10_1109_JIOT_2022_3174184
crossref_primary_10_1109_TMC_2017_2711027
crossref_primary_10_1109_TSC_2023_3273208
crossref_primary_10_1186_s13677_020_00186_7
crossref_primary_10_1109_TSC_2021_3065356
crossref_primary_10_3390_ijgi10070454
crossref_primary_10_3390_s22134908
crossref_primary_10_1016_j_ins_2020_03_107
crossref_primary_10_1109_ACCESS_2023_3288338
Cites_doi 10.1007/s11280-013-0223-7
10.1007/11681878_14
10.1561/0400000042
10.1145/2588555.2612172
10.1109/MC.2013.123
10.1007/978-1-4615-1467-1_6
10.1038/srep01376
10.1109/TSMC.2014.2327053
10.1007/11535331_10
10.1007/BFb0054135
10.1145/508171.508174
10.1109/ICDCS.2008.79
10.1007/978-3-540-73540-3_14
10.1145/335191.335415
10.1007/3-540-48910-X_16
10.1109/INFOCOM.2014.6848002
10.1007/978-3-642-39527-7_31
10.1007/978-3-540-79228-4_1
10.1007/11957454_23
10.1109/ICDE.2014.6816688
10.14778/1687627.1687754
10.1145/1376616.1376631
ContentType Journal Article
Copyright Copyright IEEE Computer Society 2019
Copyright_xml – notice: Copyright IEEE Computer Society 2019
DBID 97E
RIA
RIE
AAYXX
CITATION
JQ2
DOI 10.1109/TDSC.2017.2693986
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE/IET Electronic Library (IEL) (UW System Shared)
CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList ProQuest Computer Science Collection

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Business
EISSN 1941-0018
EndPage 343
ExternalDocumentID 10_1109_TDSC_2017_2693986
7898510
Genre orig-research
GrantInformation_xml – fundername: Turk Telekom
GroupedDBID .4S
.DC
0R~
29I
4.4
5GY
5VS
6IK
7WY
8FE
8FG
8FL
8R4
8R5
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJCF
ABQJQ
ABUWG
ABVLG
ACGFO
ACIWK
AENEX
AETIX
AFKRA
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
ATWAV
AZQEC
BEFXN
BENPR
BEZIV
BFFAM
BGLVJ
BGNUA
BKEBE
BPEOZ
BPHCQ
CCPQU
CS3
DU5
DWQXO
EBS
EDO
EJD
FRNLG
GNUQQ
HCIFZ
HZ~
IEDLZ
IFIPE
IPLJI
ITG
ITH
JAVBF
K60
K6V
K6~
K7-
L6V
LAI
M0C
M43
M7S
O9-
OCL
P2P
P62
PHGZM
PHGZT
PQBIZ
PQBZA
PQGLB
PQQKQ
PROAC
PTHSS
PUEGO
Q2X
RIA
RIE
RNI
RNS
RZB
AAYXX
CITATION
JQ2
ID FETCH-LOGICAL-c293t-3a85b4fd441acaf937027ca0f738c85d6e6346cccc73bd6093c1c4a4b37d69f63
IEDL.DBID RIE
ISICitedReferencesCount 27
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000461357500011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1545-5971
IngestDate Thu Sep 25 00:43:44 EDT 2025
Sat Nov 29 03:48:42 EST 2025
Tue Nov 18 21:32:53 EST 2025
Wed Aug 27 02:51:28 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 2
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-3a85b4fd441acaf937027ca0f738c85d6e6346cccc73bd6093c1c4a4b37d69f63
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-3383-1081
0000-0003-0834-8805
PQID 2191269390
PQPubID 27603
PageCount 15
ParticipantIDs proquest_journals_2191269390
crossref_primary_10_1109_TDSC_2017_2693986
ieee_primary_7898510
crossref_citationtrail_10_1109_TDSC_2017_2693986
PublicationCentury 2000
PublicationDate 2019-03-01
PublicationDateYYYYMMDD 2019-03-01
PublicationDate_xml – month: 03
  year: 2019
  text: 2019-03-01
  day: 01
PublicationDecade 2010
PublicationPlace Washington
PublicationPlace_xml – name: Washington
PublicationTitle IEEE transactions on dependable and secure computing
PublicationTitleAbbrev TDSC
PublicationYear 2019
Publisher IEEE
IEEE Computer Society
Publisher_xml – name: IEEE
– name: IEEE Computer Society
References ref12
ref14
mokbel (ref19) 2006
cardinal (ref2) 2006
ref10
ref17
ref16
benaloh (ref1) 1994
zhang (ref29) 2006
goldreich (ref15) 2009
ref24
liu (ref18) 0
ref23
ref26
ref25
ref20
ref22
ref21
dwork (ref11) 2014; 9
ref28
ref27
ref8
ref7
ref9
ref4
ref3
ref6
ref5
gentry (ref13) 2009
References_xml – year: 2009
  ident: ref13
  article-title: A fully homomorphic encryption scheme
– ident: ref23
  doi: 10.1007/s11280-013-0223-7
– year: 0
  ident: ref18
  article-title: Paillier's cryptosystem in Java
– ident: ref10
  doi: 10.1007/11681878_14
– volume: 9
  start-page: 211
  year: 2014
  ident: ref11
  article-title: The algorithmic foundations of differential privacy
  publication-title: Found Trends Theoretical Comput Sci
  doi: 10.1561/0400000042
– ident: ref3
  doi: 10.1145/2588555.2612172
– ident: ref12
  doi: 10.1109/MC.2013.123
– ident: ref6
  doi: 10.1007/978-1-4615-1467-1_6
– ident: ref5
  doi: 10.1038/srep01376
– year: 2009
  ident: ref15
  publication-title: Foundations of Cryptography Volume 2 Basic Applications
– ident: ref27
  doi: 10.1109/TSMC.2014.2327053
– ident: ref8
  doi: 10.1007/11535331_10
– ident: ref21
  doi: 10.1007/BFb0054135
– ident: ref7
  doi: 10.1145/508171.508174
– start-page: 763
  year: 2006
  ident: ref19
  article-title: The new casper: Query processing for location services without compromising privacy
  publication-title: Proc 32nd Int Conf Very Large Data Bases
– ident: ref24
  doi: 10.1109/ICDCS.2008.79
– ident: ref16
  doi: 10.1007/978-3-540-73540-3_14
– start-page: 643
  year: 2006
  ident: ref29
  article-title: Progressive computation of the min-dist optimal-location query
  publication-title: Proc 32nd Int Conf Very Large Data Bases
– ident: ref17
  doi: 10.1145/335191.335415
– ident: ref22
  doi: 10.1007/3-540-48910-X_16
– ident: ref20
  doi: 10.1109/INFOCOM.2014.6848002
– ident: ref26
  doi: 10.1007/978-3-642-39527-7_31
– ident: ref9
  doi: 10.1007/978-3-540-79228-4_1
– ident: ref4
  doi: 10.1007/11957454_23
– ident: ref28
  doi: 10.1109/ICDE.2014.6816688
– start-page: 149
  year: 2006
  ident: ref2
  article-title: Min-max-min geometric facility location problems
  publication-title: Proc Workshop Computational Geometry
– start-page: 120
  year: 1994
  ident: ref1
  article-title: Dense probabilistic encryption
  publication-title: Proc Workshop Sel Areas Cryptography
– ident: ref25
  doi: 10.14778/1687627.1687754
– ident: ref14
  doi: 10.1145/1376616.1376631
SSID ssj0024894
Score 2.3294764
Snippet Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 329
SubjectTerms Aggregates
algorithm/protocol design and analysis
Analytics
and protection
Business
Computer privacy
Customers
Cybersecurity
data encryption
Data privacy
Encryption
integrity
Privacy
Protocols
Queries
query processing
security
Servers
Title Privacy-Preserving Aggregate Queries for Optimal Location Selection
URI https://ieeexplore.ieee.org/document/7898510
https://www.proquest.com/docview/2191269390
Volume 16
WOSCitedRecordID wos000461357500011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE/IET Electronic Library (IEL)
  customDbUrl:
  eissn: 1941-0018
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0024894
  issn: 1545-5971
  databaseCode: RIE
  dateStart: 20040101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEB1qEfFitVWsVtmDJzG62ewmm2OpFg9SKyr0tmSTbBG0lX6B_95Juq2CIrinHJKwZJKZN5nJPICzHDdBGtmCGGoUiROqiTI0JsxhZymFLKLCk02IXi8dDGS_AhfrtzDWWp98Zi9d08fyzVjP3VXZlUglAgR00DeE4Mu3Wl919VJPeugQAUGQTMsIJg3l1dP1Y8clcYnLiEsm3bPpbzbIk6r80MTevHRr__uxXdgpYWTQXsp9Dyp2VIetVRZ7HWortoagPLwN6PQnLwulP4jLunAaYjQM2kN0t91FWvAwdxWPpwFi2OAe1cgbzn43Xt7nBY-eLAdb-_DcvXnq3JKSQoFotOMzwlSa5HFhEPQorQrEIuiGahUWgqU6TQy3nMVc4ydYbngomaY6VnHOhOGy4OwAqqPxyB5CgLjKUpqjLYuKmFqTKhWipGMXt-NJkjQhXC1qpsv64o7m4jXzfkYoMyeHzMkhK-XQhPP1kPdlcY2_Ojfcwq87lmvehNZKcll5_KYZqmHqh4VHv486hm3HG--z8ngLqrPJ3J7Apl7MXqaTU7-zPgEHZ8oL
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5ERb1YrYr1uQdPYnSzyT5yLFVRrLViBW9LNsmWgrbSF_jvnWS3VVAE95RDsrvMJDPfJJP5AE4ynARJYHKiqZaEh1QRqSknzGJnIWKRB7kjm4hbreTlRbQX4Gx-F8YY45LPzLlturN8PVATu1V2EScCAQIG6Esh54Ff3Nb6qqyXONpDiwkIwmRanmFSX1x0Lp8aNo0rPg8iwYS9OP3NCzlalR-22DmY68r_fm0D1ksg6dULzW_CgulXYWWWx16FyoyvwSuX7xY02sPeVKoPYvMurI3od716FwNuu5XmPU5szeORhyjWe0BD8oZvbw6KHT3vydHlYGsbnq-vOo0bUpIoEIWefEyYTMKM5xphj1QyRzSCgaiSfh6zRCWhjkzEeKTwiVmmI18wRRWXPGOxjkQesR1Y7A_6Zhc8RFaG0gy9WZBzanQipY-65vbkLgrDsAb-TKipKiuMW6KL19RFGr5IrR5Sq4e01EMNTudD3ovyGn913rKCn3csZV6Dg5nm0nIBjlI0xNQN8_d-H3UMqzed-2bavG3d7cMafkcUqWUHsDgeTswhLKvpuDcaHrlZ9gm1fc1U
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Privacy-Preserving+Aggregate+Queries+for+Optimal+Location+Selection&rft.jtitle=IEEE+transactions+on+dependable+and+secure+computing&rft.au=Yilmaz%2C+Emre&rft.au=Ferhatosmanoglu%2C+Hakan&rft.au=Ayday%2C+Erman&rft.au=Remzi+Can+Aksoy&rft.date=2019-03-01&rft.pub=IEEE+Computer+Society&rft.issn=1545-5971&rft.eissn=1941-0018&rft.volume=16&rft.issue=2&rft.spage=329&rft_id=info:doi/10.1109%2FTDSC.2017.2693986&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-5971&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-5971&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-5971&client=summon