Privacy-Preserving Aggregate Queries for Optimal Location Selection
Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of the time. Other businesses also want to use this information for location analytics, such as finding the optimal location for a new branch. Ho...
Uloženo v:
| Vydáno v: | IEEE transactions on dependable and secure computing Ročník 16; číslo 2; s. 329 - 343 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Washington
IEEE
01.03.2019
IEEE Computer Society |
| Témata: | |
| ISSN: | 1545-5971, 1941-0018 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of the time. Other businesses also want to use this information for location analytics, such as finding the optimal location for a new branch. However, location data owners cannot share their data with other businesses, mainly due to privacy and legal concerns. In this paper, we propose privacy-preserving solutions in which location-based queries can be answered by data owners without sharing their data with other businesses and without accessing sensitive information such as the customer list of the businesses that send the query. We utilize a partially homomorphic cryptosystem as the building block of the proposed protocols. We prove the security of the protocols in semi-honest threat model. We also explain how to achieve differential privacy in the proposed protocols and discuss its impact on utility. We evaluate the performance of the protocols with real and synthetic datasets and show that the proposed solutions are highly practical. The proposed solutions will facilitate an effective sharing of sensitive data between entities and joint analytics in a wide range of applications without violating their customers' privacy. |
|---|---|
| AbstractList | Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of the time. Other businesses also want to use this information for location analytics, such as finding the optimal location for a new branch. However, location data owners cannot share their data with other businesses, mainly due to privacy and legal concerns. In this paper, we propose privacy-preserving solutions in which location-based queries can be answered by data owners without sharing their data with other businesses and without accessing sensitive information such as the customer list of the businesses that send the query. We utilize a partially homomorphic cryptosystem as the building block of the proposed protocols. We prove the security of the protocols in semi-honest threat model. We also explain how to achieve differential privacy in the proposed protocols and discuss its impact on utility. We evaluate the performance of the protocols with real and synthetic datasets and show that the proposed solutions are highly practical. The proposed solutions will facilitate an effective sharing of sensitive data between entities and joint analytics in a wide range of applications without violating their customers’ privacy. |
| Author | Yilmaz, Emre Ayday, Erman Aksoy, Remzi Can Ferhatosmanoglu, Hakan |
| Author_xml | – sequence: 1 givenname: Emre orcidid: 0000-0003-0834-8805 surname: Yilmaz fullname: Yilmaz, Emre email: emre.yilmaz@cs.bilkent.edu.tr organization: Computer Engineering Department, Bilkent University, Ankara, Turkey – sequence: 2 givenname: Hakan surname: Ferhatosmanoglu fullname: Ferhatosmanoglu, Hakan email: hakan.f@warwick.ac.uk organization: Department of Computer Science, University of Warwick, Coventry, UK – sequence: 3 givenname: Erman orcidid: 0000-0003-3383-1081 surname: Ayday fullname: Ayday, Erman email: erman@cs.bilkent.edu.tr organization: Computer Engineering Department, Bilkent University, Ankara, Turkey – sequence: 4 givenname: Remzi Can surname: Aksoy fullname: Aksoy, Remzi Can email: remzican@umich.edu organization: Bilkent University, Ankara, Turkey |
| BookMark | eNp9kE9PwkAQxTcGEwH9AMZLE8_F3e52_xxJFTUhAQOeN8t22iypLe4WEr69LRAPHpzLzOH9Zua9ERrUTQ0I3RM8IQSrp_XzKpskmIhJwhVVkl-hIVGMxBgTOejmlKVxqgS5QaMQthgnTCo2RNnSu4Oxx3jpIYA_uLqMpmXpoTQtRB978A5CVDQ-Wuxa92WqaN5Y07qmjlZQge2nW3RdmCrA3aWP0efsZZ29xfPF63s2ncc2UbSNqZHphhU5Y8RYUygqcCKswYWg0so058Ap47YrQTc5x4paYplhGypyrgpOx-jxvHfnm-89hFZvm72vu5M6IYqcjONOJc4q65sQPBTauvb0ceuNqzTBuk9M94npPjF9SawjyR9y5zvL_vgv83BmHAD86oVUMiWY_gCt-Xjc |
| CODEN | ITDSCM |
| CitedBy_id | crossref_primary_10_1109_JIOT_2023_3307478 crossref_primary_10_1007_s11227_022_04601_5 crossref_primary_10_1155_2020_8895281 crossref_primary_10_1515_libri_2019_0140 crossref_primary_10_3390_app15031641 crossref_primary_10_1145_3423165 crossref_primary_10_1016_j_knosys_2021_106952 crossref_primary_10_1145_3617589 crossref_primary_10_1109_JIOT_2022_3174184 crossref_primary_10_1109_TMC_2017_2711027 crossref_primary_10_1109_TSC_2023_3273208 crossref_primary_10_1186_s13677_020_00186_7 crossref_primary_10_1109_TSC_2021_3065356 crossref_primary_10_3390_ijgi10070454 crossref_primary_10_3390_s22134908 crossref_primary_10_1016_j_ins_2020_03_107 crossref_primary_10_1109_ACCESS_2023_3288338 |
| Cites_doi | 10.1007/s11280-013-0223-7 10.1007/11681878_14 10.1561/0400000042 10.1145/2588555.2612172 10.1109/MC.2013.123 10.1007/978-1-4615-1467-1_6 10.1038/srep01376 10.1109/TSMC.2014.2327053 10.1007/11535331_10 10.1007/BFb0054135 10.1145/508171.508174 10.1109/ICDCS.2008.79 10.1007/978-3-540-73540-3_14 10.1145/335191.335415 10.1007/3-540-48910-X_16 10.1109/INFOCOM.2014.6848002 10.1007/978-3-642-39527-7_31 10.1007/978-3-540-79228-4_1 10.1007/11957454_23 10.1109/ICDE.2014.6816688 10.14778/1687627.1687754 10.1145/1376616.1376631 |
| ContentType | Journal Article |
| Copyright | Copyright IEEE Computer Society 2019 |
| Copyright_xml | – notice: Copyright IEEE Computer Society 2019 |
| DBID | 97E RIA RIE AAYXX CITATION JQ2 |
| DOI | 10.1109/TDSC.2017.2693986 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library (IEL) (UW System Shared) CrossRef ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science Business |
| EISSN | 1941-0018 |
| EndPage | 343 |
| ExternalDocumentID | 10_1109_TDSC_2017_2693986 7898510 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: Turk Telekom |
| GroupedDBID | .4S .DC 0R~ 29I 4.4 5GY 5VS 6IK 7WY 8FE 8FG 8FL 8R4 8R5 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJCF ABQJQ ABUWG ABVLG ACGFO ACIWK AENEX AETIX AFKRA AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATWAV AZQEC BEFXN BENPR BEZIV BFFAM BGLVJ BGNUA BKEBE BPEOZ BPHCQ CCPQU CS3 DU5 DWQXO EBS EDO EJD FRNLG GNUQQ HCIFZ HZ~ IEDLZ IFIPE IPLJI ITG ITH JAVBF K60 K6V K6~ K7- L6V LAI M0C M43 M7S O9- OCL P2P P62 PHGZM PHGZT PQBIZ PQBZA PQGLB PQQKQ PROAC PTHSS PUEGO Q2X RIA RIE RNI RNS RZB AAYXX CITATION JQ2 |
| ID | FETCH-LOGICAL-c293t-3a85b4fd441acaf937027ca0f738c85d6e6346cccc73bd6093c1c4a4b37d69f63 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 27 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000461357500011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1545-5971 |
| IngestDate | Thu Sep 25 00:43:44 EDT 2025 Sat Nov 29 03:48:42 EST 2025 Tue Nov 18 21:32:53 EST 2025 Wed Aug 27 02:51:28 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 2 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c293t-3a85b4fd441acaf937027ca0f738c85d6e6346cccc73bd6093c1c4a4b37d69f63 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0003-3383-1081 0000-0003-0834-8805 |
| PQID | 2191269390 |
| PQPubID | 27603 |
| PageCount | 15 |
| ParticipantIDs | proquest_journals_2191269390 crossref_primary_10_1109_TDSC_2017_2693986 ieee_primary_7898510 crossref_citationtrail_10_1109_TDSC_2017_2693986 |
| PublicationCentury | 2000 |
| PublicationDate | 2019-03-01 |
| PublicationDateYYYYMMDD | 2019-03-01 |
| PublicationDate_xml | – month: 03 year: 2019 text: 2019-03-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Washington |
| PublicationPlace_xml | – name: Washington |
| PublicationTitle | IEEE transactions on dependable and secure computing |
| PublicationTitleAbbrev | TDSC |
| PublicationYear | 2019 |
| Publisher | IEEE IEEE Computer Society |
| Publisher_xml | – name: IEEE – name: IEEE Computer Society |
| References | ref12 ref14 mokbel (ref19) 2006 cardinal (ref2) 2006 ref10 ref17 ref16 benaloh (ref1) 1994 zhang (ref29) 2006 goldreich (ref15) 2009 ref24 liu (ref18) 0 ref23 ref26 ref25 ref20 ref22 ref21 dwork (ref11) 2014; 9 ref28 ref27 ref8 ref7 ref9 ref4 ref3 ref6 ref5 gentry (ref13) 2009 |
| References_xml | – year: 2009 ident: ref13 article-title: A fully homomorphic encryption scheme – ident: ref23 doi: 10.1007/s11280-013-0223-7 – year: 0 ident: ref18 article-title: Paillier's cryptosystem in Java – ident: ref10 doi: 10.1007/11681878_14 – volume: 9 start-page: 211 year: 2014 ident: ref11 article-title: The algorithmic foundations of differential privacy publication-title: Found Trends Theoretical Comput Sci doi: 10.1561/0400000042 – ident: ref3 doi: 10.1145/2588555.2612172 – ident: ref12 doi: 10.1109/MC.2013.123 – ident: ref6 doi: 10.1007/978-1-4615-1467-1_6 – ident: ref5 doi: 10.1038/srep01376 – year: 2009 ident: ref15 publication-title: Foundations of Cryptography Volume 2 Basic Applications – ident: ref27 doi: 10.1109/TSMC.2014.2327053 – ident: ref8 doi: 10.1007/11535331_10 – ident: ref21 doi: 10.1007/BFb0054135 – ident: ref7 doi: 10.1145/508171.508174 – start-page: 763 year: 2006 ident: ref19 article-title: The new casper: Query processing for location services without compromising privacy publication-title: Proc 32nd Int Conf Very Large Data Bases – ident: ref24 doi: 10.1109/ICDCS.2008.79 – ident: ref16 doi: 10.1007/978-3-540-73540-3_14 – start-page: 643 year: 2006 ident: ref29 article-title: Progressive computation of the min-dist optimal-location query publication-title: Proc 32nd Int Conf Very Large Data Bases – ident: ref17 doi: 10.1145/335191.335415 – ident: ref22 doi: 10.1007/3-540-48910-X_16 – ident: ref20 doi: 10.1109/INFOCOM.2014.6848002 – ident: ref26 doi: 10.1007/978-3-642-39527-7_31 – ident: ref9 doi: 10.1007/978-3-540-79228-4_1 – ident: ref4 doi: 10.1007/11957454_23 – ident: ref28 doi: 10.1109/ICDE.2014.6816688 – start-page: 149 year: 2006 ident: ref2 article-title: Min-max-min geometric facility location problems publication-title: Proc Workshop Computational Geometry – start-page: 120 year: 1994 ident: ref1 article-title: Dense probabilistic encryption publication-title: Proc Workshop Sel Areas Cryptography – ident: ref25 doi: 10.14778/1687627.1687754 – ident: ref14 doi: 10.1145/1376616.1376631 |
| SSID | ssj0024894 |
| Score | 2.3294764 |
| Snippet | Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 329 |
| SubjectTerms | Aggregates algorithm/protocol design and analysis Analytics and protection Business Computer privacy Customers Cybersecurity data encryption Data privacy Encryption integrity Privacy Protocols Queries query processing security Servers |
| Title | Privacy-Preserving Aggregate Queries for Optimal Location Selection |
| URI | https://ieeexplore.ieee.org/document/7898510 https://www.proquest.com/docview/2191269390 |
| Volume | 16 |
| WOSCitedRecordID | wos000461357500011&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE/IET Electronic Library (IEL) (UW System Shared) customDbUrl: eissn: 1941-0018 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0024894 issn: 1545-5971 databaseCode: RIE dateStart: 20040101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fS8MwED7mEPHF6aY4ndIHn8Rs7dIlzeOYDh9kTjZhbyVJ0yHoJvsF_vde0nYKimCf8pALJZdcvkvu7gO4olKlCtcKLl4pSJgoSVTa5kTItpQaAX-kUkc2wQeDaDIRwxLcbHNhjDEu-Mw0bdO95SdzvbZXZS0eCQQI6KDvcM6yXK2vunqRIz20iIAgSA7yF8zAF63x7ahng7h4s80EFTZt-tsZ5EhVflhid7z0K__7sUM4yGGk1830fgQlM6vCXhHFXoVKwdbg5Zu3Br3h4mUj9QexURfWQsymXneK7ra9SPOe1rbi8dJDDOs9ohl5w9Ef5tl9njdyZDnYOobn_t24d09yCgWi8RxfESqjjgrTBEGP1DJFLIJuqJZ-ymmko07CDKMh0_hxqhLmC6oDHcpQUZ4wkTJ6AuXZfGZOwWOaCqUSib1laBBVCSr9KMWx0ClBgTr4xaTGOq8vbmkuXmPnZ_gitnqIrR7iXA91uN6KvGfFNf7qXLMTv-2Yz3kdGoXm4nz7LWM0w4ET889-lzqHfRxbZMFkDSivFmtzAbt6s3pZLi7dyvoEXG3MEg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3fT8IwEL4QNOqLKGhEUffgk3GwrWNbHwlKMCJiwIS3pe06QqLD8Cvxv_fabWiiMXFPfei1S6-9ftde7wO4IozHHOcKTl5GTTfizOSx45uUOYwJBPwBjzXZhN_vB-MxHRTgZvMWRkqpg89kXRX1XX40Eyt1VNbwA4oAAR30rabrOlb6Wusrs16gaQ8VJjARJtvZHaZt0cbodthWYVx-3fEooerh9LddSNOq_LDFeoPplP73awewnwFJo5Vq_hAKMinDTh7HXoZSztdgZMu3Au3BfLpm4sNUcRfKRiQTozVBh1sdpRnPK5XzeGEgijWe0JC8Yeu9WXqiZww1XQ6WjuClczdqd82MRMEUuJMvTcKCJnfjCGEPEyxGNIKOqGBW7JNABM3Ikx5xPYGfT3jkWZQIW7jM5cSPPBp75BiKySyRJ2B4glDOI4a1mSsRV1HCrCDGttAtQYEqWPmghiLLMK6ILl5D7WlYNFR6CJUewkwPVbjeiLyn6TX-qlxRA7-pmI15FWq55sJsAS5CNMS2FrNOf5e6hN3u6LEX9u77D2ewh_3QNLSsBsXlfCXPYVusl9PF_ELPsk8kNs9Z |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Privacy-Preserving+Aggregate+Queries+for+Optimal+Location+Selection&rft.jtitle=IEEE+transactions+on+dependable+and+secure+computing&rft.au=Yilmaz%2C+Emre&rft.au=Ferhatosmanoglu%2C+Hakan&rft.au=Ayday%2C+Erman&rft.au=Aksoy%2C+Remzi+Can&rft.date=2019-03-01&rft.issn=1545-5971&rft.eissn=1941-0018&rft.volume=16&rft.issue=2&rft.spage=329&rft.epage=343&rft_id=info:doi/10.1109%2FTDSC.2017.2693986&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TDSC_2017_2693986 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-5971&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-5971&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-5971&client=summon |