A Privacy-Preserving, Accountable and Spam-Resilient Geo-Marketplace

@article{Nguyen2019APA,
  title={A Privacy-Preserving, Accountable and Spam-Resilient Geo-Marketplace},
  author={Kien Nguyen and Gabriel Ghinita and Muhammad Naveed and C. Shahabi},
  journal={Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems},
  year={2019}
}
  • Kien Nguyen, Gabriel Ghinita, +1 author C. Shahabi
  • Published 2019
  • Computer Science
  • Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Mobile devices with rich features can record videos, traffic parameters or air quality readings along user trajectories. Although such data may be valuable, users are seldom rewarded for collecting them. Emerging digital marketplaces allow owners to advertise their data to interested buyers. We focus on geo-marketplaces, where buyers search data based on geo-tags. Such marketplaces present significant challenges. First, if owners upload data with revealed geo-tags, they expose themselves to… Expand
Technical perspective: Computing the value of location data
TLDR
Establishing fair prices for GPS data is a first step toward building a geo-marketplace, where sellers can be fairly compensated, and buyers can determine which data is most valuable for their application. Expand
Spatial Privacy Pricing: The Interplay between Privacy, Utility and Price in Geo-Marketplaces
TLDR
This work formalizes the issues mathematically with an example problem of a buyer deciding whether or not to open a restaurant by purchasing location data to determine if the potential number of customers is sufficient to open and presents two algorithms to solve this problem. Expand
An Efficient and Secure Location-based Alert Protocol using Searchable Encryption and Huffman Codes
TLDR
A novel method for variable-length location encoding based on Huffman codes is proposed, able to significantly speed up performance by controlling the length required to represent encrypted locations and the corresponding matching predicates, and it is shown through extensive experiments that the improvement compared with fixed-length encoding methods is substantial. Expand
Enhancing the Performance of Spatial Queries on Encrypted Data Through Graph Embedding
TLDR
This work focuses on a prominent SE technique in the public-key setting – Hidden Vector Encryption (HVE), and proposes a graph embedding technique to encode location data in a way that significantly boosts the performance of processing on ciphertexts. Expand
Transparent and Accountable Vehicular Local Advertising With Practical Blockchain Designs
TLDR
A transparent and accountable vehicular local advertising system is developed by utilizing the tamper-proof and open nature of the blockchain technology and the security requirements are defined as Auditing Security and the notion with the security analysis is defined. Expand
Data and Applications Security and Privacy XXXIV: 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings
TLDR
This paper model both cross-layer and co-residency attacks on the NFV stack and mitigate such threats through optimizing the virtual machine (VM) placement with respect to given constraints. Expand
A Survey on Blockchain for Information Systems Management and Security
TLDR
It is highlighted that blockchain’s structure and modern cloud- and edge-computing paradigms are crucial in enabling a widespread adaption and development of blockchain technologies for new players in today unprecedented vibrant global market. Expand
MY-AIR: A Personalized Air-quality Information Service
This paper describes an information service that personalizes air pollution monitoring by considering the fine grained user location, her microenvironment, and her activity. Personalization isExpand

References

SHOWING 1-10 OF 35 REFERENCES
An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical
TLDR
Extensive experimental results show that the proposed techniques significantly improve performance compared to the baseline, and reduce the searchable encryption overhead to a level that is practical in a computing environment with reasonable resources, such as the cloud. Expand
Decentralizing Privacy: Using Blockchain to Protect Personal Data
TLDR
A decentralized personal data management system that ensures users own and control their data is described, and a protocol that turns a block chain into an automated access-control manager that does not require trust in a third party is implemented. Expand
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
TLDR
This paper proposes an effective announcement network called CreditCoin, a novel privacy-preserving incentive announcement network based on Blockchain via an efficient anonymous vehicular announcement aggregation protocol, and shows that CreditCoin is efficient and practical in simulations of smart transportation. Expand
Practical techniques for searches on encrypted data
TLDR
This work describes the cryptographic schemes for the problem of searching on encrypted data and provides proofs of security for the resulting crypto systems, and presents simple, fast, and practical algorithms that are practical to use today. Expand
Result Pattern Hiding Searchable Encryption for Conjunctive Queries
TLDR
This paper proposes a new SSE protocol, called Hidden Cross-Tags (HXT), that removes 'Keyword Pair Result Pattern' (KPRP) leakage for conjunctive keyword search, and proposes a 'lightweight' HVE scheme that only uses efficient symmetric-key building blocks, and entirely avoids elliptic curve-based operations. Expand
Secure Indexes
  • Eu-Jin Goh
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • 2003
TLDR
This paper formally defines a secure index and formulate a security model for indexes known as semantic security against adaptive chosen keyword attack (ind-cka), and develops an efficient indcka secure index construction called z-idx using pseudo-random functions and Bloom filters. Expand
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
TLDR
Hawk is a decentralized smart contract system that does not store financial transactions in the clear on the blockchain, thus retaining transactional privacy from the public's view, and is the first to formalize the blockchain model of cryptography. Expand
Searchable symmetric encryption: improved definitions and efficient constructions
TLDR
This paper formally defines SSE in the multi-user setting, and presents an efficient construction that achieves better performance than simply using access control mechanisms. Expand
Delegatable pseudorandom functions and applications
TLDR
Two DPRF constructions are built upon the well-known tree-based GGM PRF family and feature only logarithmic delegation size in the number of values conforming to the policy predicate, and it is shown that the second construction is also policy private. Expand
GEM^2-Tree: A Gas-Efficient Structure for Authenticated Range Queries in Blockchain
TLDR
A novel ADS, called GEM^2-tree, is proposed, which is not only gas-efficient but also effective in supporting authenticated queries in the hybrid-storage blockchain, in which a unique gas cost model is employed. Expand
...
1
2
3
4
...