Practical Privacy-Preserving Indoor Localization Based on Secure Two-Party Computation

نویسندگان

چکیده

We present a privacy-preserving indoor localization scheme based on received signal strength measurements, e.g., from WiFi access points. Our preserves the privacy of both client's location and service provider's database by using secure two-party computation instantiated with known cryptographic primitives, namely, Paillier encryption garbled circuits. describe number optimizations that reduce communication overheads provide theoretical evaluations these overheads. also demonstrate feasibility developing proof-of-concept implementation for Android smartphones commodity servers. This allows us to validate practical performance our show it is feasible use in certain types applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Two-Party Computation Is Practical

Secure multi-party computation has been considered by the cryptographic community for a number of years. Until recently it has been a purely theoretical area, with few implementations with which to test various ideas. This has led to a number of optimisations being proposed which are quite restricted in their application. In this paper we describe an implementation of the two-party case, using ...

متن کامل

Privacy Preserving PageRank Algorithm By Using Secure Multi-Party Computation

In this work, we study the problem of privacy preserving computation on PageRank algorithm. The idea is to enforce the secure multi party computation of the algorithm iteratively using homomorphic encryption based on Paillier scheme. In the proposed PageRank computation, a user encrypt its own graph data using asymmetric encryption method, sends the data set into different parties in a privacy-...

متن کامل

Privacy-Preserving Classification and Clustering Using Secure Multi-Party Computation

Nowadays, data mining and machine learning techniques are widely used in electronic applications in different areas such as e-government, e-health, e-business, and so on. One major and very crucial issue in these type of systems, which are normally distributed among two or more parties and are dealing with sensitive data, is preserving the privacy of individual’s sensitive information. Each par...

متن کامل

On Secure Two-party Computation

1.1. Secure Two-Party Computation. In essence, secure multiparty computation is the solution to the problem how to compute on private inputs from several parties when we do not trust other parties and we don’t have a central authority who can get inputs, perform computations and give outputs to those that need them. Here we will talk about secure twoparty computation, where Alice, holding xa an...

متن کامل

POSTER: Privacy-preserving Indoor Localization

Upcoming WiFi-based localization systems for indoor environments face a conflict of privacy interests: Server-side localization violates location privacy of the users, while localization on the user’s device forces the localization provider to disclose the details of the system, e.g., sophisticated classification models. We show how Secure Two-Party Computation can be used to reconcile privacy ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Mobile Computing

سال: 2021

ISSN: ['2161-9875', '1536-1233', '1558-0660']

DOI: https://doi.org/10.1109/tmc.2020.2990871