TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing

Open access

Abstract

Ridesharing is revolutionizing the transportation industry in many countries. Yet, the state of the art is based on heavily centralized services and platforms, where the service providers have full possession of the users’ location data. Recently, researchers have started addressing the challenge of enabling privacy-preserving ridesharing. The initial proposals, however, have shortcomings, as some rely on a central party, some incur high performance penalties, and most do not consider time preferences for ridesharing. TOPPool encompasses ridesharing based on the proximity of end-points of a ride as well as partial itinerary overlaps. To achieve the latter, we propose a simple yet powerful reduction to a private set intersection on trips represented as sets of consecutive road segments. We show that TOPPool includes time preferences while preserving privacy and without relying on a third party. We evaluate our approach on real-world data from the New York’s Taxi & Limousine Commission. Our experiments demonstrate that TOPPool is superior in performance over the prior work: our intersection-based itinerary matching runs in less than 0.3 seconds for reasonable trip length, in contrast, on the same set of trips prior work takes up to 10 hours.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] U. M. Aïvodji K. Huguenin M. Huguet and M. Killijian. Sride: A privacy-preserving ridesharing system. In WISEC pages 40–50. ACM 2018.

  • [2] U. M. Aïvodji S. Gambs M.-J. Huguet and M.-O. Killijian. Meeting points in ridesharing: A privacy-preserving approach. Transportation Research Part C: Emerging Technologies 72:239 – 253 2016.

  • [3] F. Baldimtsi and A. Lysyanskaya. Anonymous credentials light. In ACM Conference on Computer and Communications Security pages 1087–1098. ACM 2013.

  • [4] C. Bessette. Does Uber Even Deserve Our Trust? http://www.forbes.com/sites/chanellebessette/2014/11/25/does-uber-even-deserve-our-trust/ Nov. 2014.

  • [5] BlaBlaCar - Trusted carpooling. https://www.blablacar.com/.

  • [6] R. Chen B. C. M. Fung and B. C. Desai. Differentially private trajectory data publication. CoRR abs/1112.2020 2011.

  • [7] M. Ciampi and C. Orlandi. Combining private set-intersection with secure two-party computation. In Security and Cryptography for Networks - 11th International Conference SCN 2018 Amalfi Italy September 5-7 2018 Proceedings pages 464–482 2018.

  • [8] I. Damgørd M. Geisler and M. Krøigard. Homomorphic Encryption and Secure Comparison. Int. J. Appl. Cryptol. 1(1):22–31 Feb. 2008.

  • [9] O. Foundation. OpenStreetMap. https://www.openstreetmap.org/.

  • [10] M. J. Freedman K. Nissim and B. Pinkas. Efficient private matching and set intersection. In Advances in Cryptology - EUROCRYPT 2004 International Conference on the Theory and Applications of Cryptographic Techniques Interlaken Switzerland May 2-6 2004 Proceedings pages 1–19 2004.

  • [11] D. Freni C. R. Vicente S. Mascetti C. Bettini and C. S. Jensen. Preserving location and absence privacy in geosocial networks. In Proceedings of the 19th ACM Conference on Information and Knowledge Management CIKM 2010 Toronto Ontario Canada October 26-30 2010 pages 309–318 2010.

  • [12] M. Furuhata M. Dessouky F. Ordóñez M.-E. Brunet X. Wang and S. Koenig. Ridesharing: The state-of-the-art and future directions. Transportation Research Part B: Methodological 57:28 – 46 2013.

  • [13] General Data Protection Regulation EU Regulation 2016/679 2018.

  • [14] C. Gentry. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing STOC 2009 Bethesda MD USA May 31 - June 2 2009 pages 169–178 2009.

  • [15] G. Ghinita. Private queries and trajectory anonymization: a dual perspective on location privacy. Trans. Data Privacy 2(1):3–19 2009.

  • [16] P. Hallgren M. Ochoa and A. Sabelfeld. InnerCircle: A parallelizable decentralized privacy-preserving location proximity protocol. In 2015 13th Annual Conference on Privacy Security and Trust (PST) pages 1–6 July 2015.

  • [17] P. Hallgren C. Orlandi and A. Sabelfeld. PrivatePool: Privacy-Preserving Ridesharing. In 2017 IEEE 30th Computer Security Foundations Symposium (CSF) pages 276–291 Aug 2017.

  • [18] P. A. Hallgren M. Ochoa and A. Sabelfeld. Innercircle: A parallelizable decentralized privacy-preserving location proximity protocol. In 13th Annual Conference on Privacy Security and Trust PST 2015 Izmir Turkey July 21-23 2015 pages 1–6 2015.

  • [19] P. A. Hallgren M. Ochoa and A. Sabelfeld. Maxpace: Speed-constrained location queries. In 2016 IEEE Conference on Communications and Network Security CNS 2016 Philadelphia PA USA October 17-19 2016 2016.

  • [20] C. Hazay and Y. Lindell. Efficient secure two-party protocols: Techniques and constructions. Springer Science & Business Media 2010.

  • [21] Y. He J. Ni X. Wang B. Niu F. Li and X. Shen. Privacy-preserving partner selection for ride-sharing services. IEEE Trans. Vehicular Technology 67(7):5994–6005 2018.

  • [22] Y. Huang D. Evans and J. Katz. Private set intersection: Are garbled circuits better than custom protocols? In 19th Annual Network and Distributed System Security Symposium NDSS 2012 San Diego California USA February 5-8 2012 2012.

  • [23] K. Järvinen Á. Kiss T. Schneider O. Tkachenko and Z. Yang. Faster privacy-preserving location proximity schemes. In CANS volume 11124 of Lecture Notes in Computer Science pages 3–22. Springer 2018.

  • [24] H. Kikuchi and K. Takahashi. Zipf distribution model for quantifying risk of re-identification from trajectory data. In 13th Annual Conference on Privacy Security and Trust PST 2015 Izmir Turkey July 21-23 2015 pages 14–21 2015.

  • [25] V. Kolesnikov R. Kumaresan M. Rosulek and N. Trieu. Efficient batched oblivious prf with applications to private set intersection. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security pages 818–829. ACM 2016.

  • [26] V. Kolesnikov R. Kumaresan M. Rosulek and N. Trieu. Efficient batched oblivious PRF with applications to private set intersection. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security Vienna Austria October 24-28 2016 pages 818–829 2016.

  • [27] J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing 13(6):391–399 2009.

  • [28] M. Li L. Zhu and X. Lin. Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing. IEEE Internet of Things Journal pages 1–1 2018.

  • [29] Lyft. https://www.lyft.com/.

  • [30] S. Mascetti D. Freni C. Bettini X. S. Wang and S. Jajodia. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J. 20(4):541–566 2011.

  • [31] A. Narayanan N. Thiagarajan M. Lakhani M. Hamburg and D. Boneh. Location privacy via private proximity testing. In Proceedings of the Network and Distributed System Security Symposium NDSS 2011 San Diego California USA 6th February - 9th February 2011 2011.

  • [32] P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In J. Stern editor Advances in Cryptology — EUROCRYPT ’99 pages 223–238 Berlin Heidelberg 1999. Springer Berlin Heidelberg.

  • [33] A. C. Pesara V. Patil and P. K. Atrey. Secure computing of gps trajectory similarity: A review. In Proceedings of the 2Nd ACM SIGSPATIAL Workshop on Recommendations for Location-based Services and Social Networks LocalRec’18 pages 3:1–3:7 New York NY USA 2018. ACM.

  • [34] A. Pham I. Dacosta G. Endignoux J. R. Troncoso-Pastoriza K. Huguenin and J. Hubaux. Oride: A privacy-preserving yet accountable ride-hailing service. In USENIX Security Symposium pages 1235–1252. USENIX Association 2017.

  • [35] A. Pham I. Dacosta B. Jacot-Guillarmod K. Huguenin T. Hajar F. Tramèr V. D. Gligor and J. Hubaux. Privateride: A privacy-enhanced ride-hailing service. PoPETs 2017(2):38–56 2017.

  • [36] B. Pinkas T. Schneider G. Segev and M. Zohner. Phasing: Private set intersection using permutation-based hashing. In 24th USENIX Security Symposium USENIX Security 15 Washington D.C. USA August 12-14 2015. pages 515–530 2015.

  • [37] B. Pinkas T. Schneider O. Tkachenko and A. Yanai. Efficient circuit-based psi with linear communication. In Advances in Cryptology - EUROCRYPT 2019 International Conference on the Theory and Applications of Cryptographic Techniques 2019.

  • [38] B. Pinkas T. Schneider and M. Zohner. Faster private set intersection based on OT extension. In Proceedings of the 23rd USENIX Security Symposium San Diego CA USA August 20-22 2014. pages 797–812 2014.

  • [39] B. Pinkas T. Schneider and M. Zohner. Scalable private set intersection based on ot extension. Cryptology ePrint Archive Report 2016/930 2016. https://eprint.iacr.org/2016/930.

  • [40] A. C. D. Resende and D. de Freitas Aranha. Faster unbalanced private set intersection. Cryptology ePrint Archive Report 2017/677 2017. https://eprint.iacr.org/2017/677.

  • [41] R. L. Rivest L. Adleman and M. L. Dertouzos. On data banks and privacy homomorphisms. Foundations of Secure Computation Academia Press 1978.

  • [42] Routino : Router for openstreetmap data. http://www.routino.org/ 2018.

  • [43] J. Sedenka and P. Gasti. Privacy-preserving distance computation and proximity testing on earth done right. In 9th ACM Symposium on Information Computer and Communications Security ASIA CCS ’14 Kyoto Japan - June 03 - 06 2014 pages 99–110 2014.

  • [44] A. B. T. Sherif K. Rabieh M. M. E. A. Mahmoud and X. Liang. Privacy-preserving ride sharing scheme for autonomous vehicles in big data era. IEEE Internet of Things Journal 4(2):611–618 2017.

  • [45] C. Shu. Uber reportedly tracked Lyft drivers using a secret software program named ‘Hell’. https://techcrunch.com/2017/04/12/hell-o-uber/ 2017.

  • [46] L. Siksnys J. R. Thomsen S. Saltenis and M. L. Yiu. Private and flexible proximity detection in mobile social networks. In Eleventh International Conference on Mobile Data Management MDM 2010 Kanas City Missouri USA 23-26 May 2010 pages 75–84 2010.

  • [47] L. Siksnys J. R. Thomsen S. Saltenis M. L. Yiu and O. Andersen. A location privacy aware friend locator. In Advances in Spatial and Temporal Databases 11th International Symposium SSTD 2009 Aalborg Denmark July 8-10 2009 Proceedings pages 405–410 2009.

  • [48] S. Stirbys O. A. Nabah P. A. Hallgren and A. Sabelfeld. Privacy-preserving location-proximity for mobile apps. In PDP pages 337–345. IEEE Computer Society 2017.

  • [49] M. Terrovitis. Privacy preservation in the dissemination of location data. SIGKDD Explorations 13(1):6–18 2011.

  • [50] The City of New York. Taxi and Limousine Commission trip data. https://www1.nyc.gov/site/tlc/about/tlc-trip-record-data.page 2016.

  • [51] N. Trieu. Github - osu-crypto/BaRK-OPRF: Efficient Batched Oblivious PRF with Applications to Private Set Intersection (CCS 2016). https://github.com/osu-crypto/BaRK-OPRF.

  • [52] Uber technologies inc. https://www.uber.com/.

  • [53] G. Zhong I. Goldberg and U. Hengartner. Louis lester and pierre: Three protocols for location privacy. In Privacy Enhancing Technologies 7th International Symposium PET 2007 Ottawa Canada June 20-22 2007 Revised Selected Papers pages 62–76 2007.

Search
Journal information
Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 58 58 39
PDF Downloads 41 41 24