<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">POIsafe: a Privacy-Conscious System for Retrieval of Points of Interest</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Daniele</forename><surname>Riboni</surname></persName>
							<email>riboni@dico.unimi.it</email>
							<affiliation key="aff0">
								<orgName type="institution">Università degli Studi di Milano</orgName>
								<address>
									<settlement>DICo, Milan</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Linda</forename><surname>Pareschi</surname></persName>
							<email>pareschi@dico.unimi.it</email>
							<affiliation key="aff0">
								<orgName type="institution">Università degli Studi di Milano</orgName>
								<address>
									<settlement>DICo, Milan</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Claudio</forename><surname>Bettini</surname></persName>
							<email>bettini@dico.unimi.it</email>
							<affiliation key="aff0">
								<orgName type="institution">Università degli Studi di Milano</orgName>
								<address>
									<settlement>DICo, Milan</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">POIsafe: a Privacy-Conscious System for Retrieval of Points of Interest</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">8D4894166AF7EE66BFCBA8C2C6FABA7F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T21:01+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract/>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Services for retrieval of points of interest (POIs) are becoming increasingly popular due to the widespread diffusion of GPS-enabled mobile devices having access to fast wireless networks. We have developed a context-aware service to share, manage, and retrieve geo-referenced resource descriptions enriched with multimedia content <ref type="bibr" target="#b0">[1]</ref>. The access to such services is prone to potentially serious privacy issues, since requests include sensitive information or can lead to the disclosure of sensitive information, and they are often handled by untrusted parties, or sent through insecure channels. Context data, including user location, is in some cases sensitive information that users prefer not to be associated with their identity. In other cases, the interest for specific resources is considered sensitive and the issuer of such a request uses a pseudonym not to be identified; however, context data present in the same request or in a sequence of requests may be used by an adversary to re-identify the issuer. We are not aware of any context-aware service for retrieval of POIs with an effective and comprehensive privacy protection mechanism, and we believe this is a challenging research goal. In this paper, we focus on one particular kind of context data, location, but we plan to extend our techniques to tackle the general problem illustrated above.</p><p>Different techniques have been proposed for protecting against the disclosure of location information in location-based services (LBS). Cryptographic approaches inspired by Private Information Retrieval (e.g., <ref type="bibr" target="#b1">[2]</ref>) provide very strong guarantees in terms of privacy; however, they determine a relevant overhead in network and power consumption and service response time, especially when applied to services that consider a wide set of context data. Obfuscationbased techniques are based on a perturbation of the user's location. In techniques based on generalization the exact location is enlarged to a region; in other cases, a fake user's location is communicated instead of the real one. In particular, the latter approach is adopted by SpaceTwist <ref type="bibr" target="#b4">[5]</ref> to enforce location privacy while guaranteeing that k-nearest neighbor (kNN) queries are correctly answered even if the user provides a fake location, at the cost of computation and communication overhead. Indeed, according to SpaceTwist, the client issues a sequence of requests from the same fake location asking for more close-by POIs until it is sure that those provided by the service include the kNN set corresponding to its real location. Based on the request-response sequence, an adversary can only identify an area (called twisted space) from which the requests may have been sent. More recently, a technique (derived from SpaceTwist) to couple location privacy with identity anonymity, named AnonTwist <ref type="bibr" target="#b3">[4]</ref>, has been proposed. Given a density map to estimate the number of people in a given area, Anon-Twist provides a probabilistic guarantee that, even if an adversary has access to presence information, the twisted space contains at least N individuals; hence, the request issuer is indistinguishable among at least N individuals. However, both SpaceTwist and AnonTwist rely on the assumption that the function that generates the fake location is unknown to the adversary.</p><p>In this paper we take into account the realistic case in which the function that generates the fake location is known to the adversary. In Section 2 we illustrate a specific technique to protect privacy under this assumption. In Section 3 we present POIsafe, an extension of our system for POIs retrieval to enforce location privacy and identity anonymity as a first step towards a comprehensive solution considering other context data. Section 4 concludes the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Enforcing privacy in POIsafe</head><p>Even if we are investigating alternative solutions, our current approach is inspired by AnonTwist <ref type="bibr" target="#b3">[4]</ref>. However, differently from AnonTwist and SpaceTwist, our proposed algorithm assumes that the function for generating fake locations could be known to the adversary. Under this assumption, by observing the fake location, the adversary may reconstruct the possible area A from which it originated. Moreover, based on the request-response sequence, the adversary is able to understand that the area from which the request originated corresponds to the intersection I between the twisted space and area A. Hence, the goal of our technique is to ensure that area I is greater than a specified threshold, and that it includes at least N potential issuers.</p><p>In particular, the maximum radius r of perturbation (e.g., 1 Km) and the minimum number of potential issuers N are chosen according to the user's preferences about privacy and quality of service (QoS). Then, before issuing a request, a random distance ranging from 0 to r is chosen, and a random point having that distance from the real user's location is chosen as the fake location. Note that with this technique, A is the area contained within the circle having center in the fake location, and radius r. Then, the client incrementally asks for nearest POIs until i) the exact kNN set is retrieved, ii) area I is greater than the chosen threshold, and iii) I contains at least N users according to the density map.</p><p>In general, the farther is the fake location from the real one, the higher is the user's privacy. However, large perturbations of the real location determine poor QoS. Indeed, even if the service guarantees to correctly answer the user's query, a very high number of POIs may be communicated to the client before obtaining the correct kNN set, determining an increase in communication and computational costs, and response time. With respect to usability, users can be provided with an intuitive interface to set their preferences; i.e., a single slider with response time on the left-hand side and privacy on the right-hand side.</p><p>The value of the slider influences the value of radius r and threshold N . Before submitting a request, density information is used to control if the value of r is adequate to provide a sufficient level of anonymity with high probability (e.g., according to the density map the corresponding area includes a number of users that doubles threshold N ). In this case, a green signal appears; in the other case, a red one is used. Note that the red signal does not mean that the technique will necessarily fail to preserve privacy, but only that anonymity might be at risk.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">System architecture</head><p>POIsafe is based on a peer-to-peer network of poisafe servers, which are in charge of managing POIs, and of searching POIs in the peer-to-peer network on the basis of the user's context and explicit search keywords. The mechanism of search in the peer-to-peer network has been presented in detail in <ref type="bibr" target="#b0">[1]</ref>. An overview of the POIsafe network is shown in Figure <ref type="figure" target="#fig_0">1(a)</ref>.</p><p>Users can access the POIsafe network from a wide range of client systems, which provide an interface for the user to browse her own POIs hierarchy, reorganize the hierarchy, add new POIs, search shared POIs in the peer-to-peer network, and set their preferences, including those regarding privacy. Before issuing a request, each client system retrieves context information useful for service adaptation. This information can be retrieved either locally or from an external context provider. Perturbation of location information and requests for POIs are executed as illustrated in Section 2. The density map is retrieved from a trusted density map server. In the previous version of POIsafe, ranking of POIs was performed only at the server side. However, since in the new version a fake user's location is communicated to the server, returned POIs are re-ranked at the client side considering the exact user's location. Moreover, an external map server is queried by the client system for obtaining maps showing the position of returned POIs and information for navigation support.</p><p>The poisafe server has been developed in Java, and implements the algorithms for POIs scoring and distributed search presented in <ref type="bibr" target="#b0">[1]</ref>, the modified AnonTwist algorithm, as well as various facilities for managing and searching POIs. The architecture adopts Web services for client/server and server/server communication. At the time of writing we have developed client systems for laptops and smartphones. In particular, we have developed a novel Android client (see Figure <ref type="figure" target="#fig_0">1(b)</ref>), which takes advantage of the integration with Google Maps.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions and future work</head><p>In this paper we presented the extension of an existing system for context-aware management and retrieval of points of interest. The extension is a first step towards a comprehensive privacy solution for this kind of services. In particular, future work includes a thorough investigation of the formal properties of the proposed algorithm. Several research issues remain open. In particular, we point out that the proposed technique may be ineffective if an adversary can observe histories of requests issued by users in different time granules. Indeed, as shown in <ref type="bibr" target="#b2">[3]</ref>, the frequency of a service parameter included in requests, matched with the presence of candidate issuers, can be exploited to associate a given user with that service parameter. The integration of techniques to protect against these kinds of attacks will be the subject of future investigation.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. POIsafe system and current implementation</figDesc><graphic coords="4,389.54,115.94,74.78,141.03" type="bitmap" /></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>The authors would like to thank Song Wang and X. Sean Wang for providing a working implementation of the AnonTwist algorithm.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Context-aware Web Services for Distributed Retrieval of Points of Interest</title>
		<author>
			<persName><forename type="first">C</forename><surname>Bettini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Riboni</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 2nd International Conference on Internet and Web Applications and Services</title>
				<meeting>of the 2nd International Conference on Internet and Web Applications and Services</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="36" to="40" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Private Queries in Location Based Services: Anonymizers are Not Necessary</title>
		<author>
			<persName><forename type="first">G</forename><surname>Ghinita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kalnis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Khoshgozaran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Shahabi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K.-L</forename><surname>Tan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of SIGMOD 2008</title>
				<meeting>of SIGMOD 2008</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="121" to="132" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Preserving Anonymity of Recurrent Location-based Queries</title>
		<author>
			<persName><forename type="first">D</forename><surname>Riboni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Pareschi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Bettini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Jajodia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 16th International Symposium on Temporal Representation and Reasoning</title>
				<meeting>of the 16th International Symposium on Temporal Representation and Reasoning</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">AnonTwist: Nearest Neighbor Querying with Both Location Privacy and k-Anonymity for Mobile Users</title>
		<author>
			<persName><forename type="first">S</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><forename type="middle">S</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of First International Workshop on Mobile Urban Sensing</title>
				<meeting>of First International Workshop on Mobile Urban Sensing</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="443" to="448" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">SpaceTwist: Managing the Tradeoffs among Location Privacy, Query Performance, and Query Accuracy in Mobile Services</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Yiu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">S</forename><surname>Jensen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Lu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of ICDE 2008</title>
				<meeting>of ICDE 2008</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="366" to="375" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
