Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices

Bilogrevic, I; Jadliwala, M.; Joneja, V.; Kalkan, K.; Hubaux, J.; Aad, Imad Rafic (2014). Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices. IEEE Transactions on Information Forensics and Security, 9(7), pp. 1141-1156. IEEE 10.1109/TIFS.2014.2318435

[img] Text
06802367.pdf - Published Version
Restricted to registered users only
Available under License Publisher holds Copyright.

Download (4MB) | Request a copy

Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. These applications often rely on current (or preferred) locations of individual users or a group of users to provide the desired service, which jeopardizes their privacy; users do not necessarily want to reveal their current (or preferred) locations to the service provider or to other, possibly untrusted, users. In this paper, we propose privacy-preserving algorithms for determining an optimal meeting location for a group of users. We perform a thorough privacy evaluation by formally quantifying privacy-loss of the proposed approaches. In order to study the performance of our algorithms in a real deployment, we implement and test their execution efficiency on Nokia smartphones. By means of a targeted user-study, we attempt to get an insight into the privacy-awareness of users in location-based services and the usability of the proposed solutions.

Item Type:

Journal Article (Original Article)


08 Faculty of Science > Institute of Computer Science (INF) > Communication and Distributed Systems (CDS)
08 Faculty of Science > Institute of Computer Science (INF)

UniBE Contributor:

Aad, Imad Rafic


000 Computer science, knowledge & systems
500 Science > 510 Mathematics








Dimitrios Xenakis

Date Deposited:

24 Jul 2014 17:29

Last Modified:

05 Dec 2022 14:36

Publisher DOI:


Uncontrolled Keywords:

Encryption, Mobile handsets, Privacy, Protocols, Public key, Servers, Mobile application, oblivious computation, privacy




Actions (login required)

Edit item Edit item
Provide Feedback