Skip to main content

On Enhancement of ‘Share The Secret’ Scheme for Location Privacy

  • Conference paper
Security and Trust Management (STM 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8203))

Included in the following conference series:

Abstract

Since location information is considered as personal information, location privacy has been emerged as one of the most important security concerns. In this paper, we enhance the ‘Share The Secret’ (STS) scheme, a privacy mechanism that segments location information into pieces (shares), distributes the shares to multiple untrustworthy location servers, and reconstructs the original location on authorized entities. We introduce certain policies based on the theory of optimal stopping in order to achieve time-optimized decisions for different levels of privacy. Moreover, we evaluate the performance of STS in terms of communication and computation load, and energy consumption. Experimental results quantify the benefits stemming for STS adoption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Marias, G.F., Delakouridis, C., Kazatzopoulos, L., Georgiadis, P.: Location Privacy Through Secret Sharing Techniques. In: 1st IEEE International Workshop on Trust, Security and Privacy for Ubiquitous Computing, TSPUC 2005, Taormina, Italy, pp. 614–620 (June 2005)

    Google Scholar 

  2. Ben-Or, M., Goldwasser, S., Wigderson, A.: ‘Completeness theorems for non-cryptographic fault-tolerant distributed computations’. In: Proc. of the 20th ACM Symp. on the Theory of Computing, pp. 1–10 (1988)

    Google Scholar 

  3. Peskir, G., Shiryaev, A.: Optimal Stopping and Free Boundary Problems (ETH Zuerich). Birkhäuser (2006)

    Google Scholar 

  4. Fasbender, A., Kesdogan, D., Kubitz, O.: Analysis of Security and Privacy in Mobile IP. In: Proc. 4th International Conf. on Telecommunication Systems, Modeling and Analysis (1996)

    Google Scholar 

  5. Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, D., Yi, S.: Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments. In: Proc. International Conf. of Distributed Computing Systems (2002)

    Google Scholar 

  6. Friday, A., Muller, H., Rodden, T., Dix, A.: A Lightweight Approach to Managing Privacy in Location-Based Services. In: Proc. Equator Annual Conference (October 2002)

    Google Scholar 

  7. Beresford, A.R., Stajano, F.: Mix zones: User privacy in location-aware services. In: PerCom Workshops 2004, pp. 127–131 (2004)

    Google Scholar 

  8. Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 47–60. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of MobiSys 2003, pp. 31–42 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Delakouridis, C., Anagnostopoulos, C. (2013). On Enhancement of ‘Share The Secret’ Scheme for Location Privacy. In: Accorsi, R., Ranise, S. (eds) Security and Trust Management. STM 2013. Lecture Notes in Computer Science, vol 8203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41098-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41098-7_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41097-0

  • Online ISBN: 978-3-642-41098-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics