Practical Privacy-Preserving Indoor Localization Based on Secure Two-Party Computation
نویسندگان
چکیده
We present a privacy-preserving indoor localization scheme based on received signal strength measurements, e.g., from WiFi access points. Our preserves the privacy of both client's location and service provider's database by using secure two-party computation instantiated with known cryptographic primitives, namely, Paillier encryption garbled circuits. describe number optimizations that reduce communication overheads provide theoretical evaluations these overheads. also demonstrate feasibility developing proof-of-concept implementation for Android smartphones commodity servers. This allows us to validate practical performance our show it is feasible use in certain types applications.
منابع مشابه
Secure Two-Party Computation Is Practical
Secure multi-party computation has been considered by the cryptographic community for a number of years. Until recently it has been a purely theoretical area, with few implementations with which to test various ideas. This has led to a number of optimisations being proposed which are quite restricted in their application. In this paper we describe an implementation of the two-party case, using ...
متن کاملPrivacy Preserving PageRank Algorithm By Using Secure Multi-Party Computation
In this work, we study the problem of privacy preserving computation on PageRank algorithm. The idea is to enforce the secure multi party computation of the algorithm iteratively using homomorphic encryption based on Paillier scheme. In the proposed PageRank computation, a user encrypt its own graph data using asymmetric encryption method, sends the data set into different parties in a privacy-...
متن کاملPrivacy-Preserving Classification and Clustering Using Secure Multi-Party Computation
Nowadays, data mining and machine learning techniques are widely used in electronic applications in different areas such as e-government, e-health, e-business, and so on. One major and very crucial issue in these type of systems, which are normally distributed among two or more parties and are dealing with sensitive data, is preserving the privacy of individual’s sensitive information. Each par...
متن کاملOn Secure Two-party Computation
1.1. Secure Two-Party Computation. In essence, secure multiparty computation is the solution to the problem how to compute on private inputs from several parties when we do not trust other parties and we don’t have a central authority who can get inputs, perform computations and give outputs to those that need them. Here we will talk about secure twoparty computation, where Alice, holding xa an...
متن کاملPOSTER: Privacy-preserving Indoor Localization
Upcoming WiFi-based localization systems for indoor environments face a conflict of privacy interests: Server-side localization violates location privacy of the users, while localization on the user’s device forces the localization provider to disclose the details of the system, e.g., sophisticated classification models. We show how Secure Two-Party Computation can be used to reconcile privacy ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Mobile Computing
سال: 2021
ISSN: ['2161-9875', '1536-1233', '1558-0660']
DOI: https://doi.org/10.1109/tmc.2020.2990871