{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:32:43Z","timestamp":1760239963573,"version":"build-2065373602"},"reference-count":63,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2019,2,8]],"date-time":"2019-02-08T00:00:00Z","timestamp":1549584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Location-based services present an inherent challenge of finding the delicate balance between efficiency when answering queries and maintaining user privacy. Inevitable security issues arise as the server needs to be informed of the query location to provide accurate responses. Despite the many advancements in localization security in wireless sensor networks, servers can still be infected with malicious software. It is now possible to ensure queries do not generate any fake responses that may appear real to users. When a fake response is used, there are mechanisms that can be employed so that the user can identify the authenticity of the query. For this reason, this paper proposes Bloom Filter 0 Knowledge (BL0K), which is novel phase privacy method that preserves the framework for location-based service (LBS) and combines a Bloom filter and the Zero knowledge protocol. The usefulness of these methods has been shown for securing private user information. Analysis of the results demonstrated that BL0K performance is decidedly better when compared to the referenced approaches using the privacy entropy metric.<\/jats:p>","DOI":"10.3390\/s19030696","type":"journal-article","created":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T03:26:01Z","timestamp":1549855561000},"page":"696","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["BL0K: A New Stage of Privacy-Preserving Scope for Location-Based Services"],"prefix":"10.3390","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2094-1070","authenticated-orcid":false,"given":"Abdullah","family":"Albelaihy","sequence":"first","affiliation":[{"name":"Department of Computer Science, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]},{"given":"Vijey","family":"Thayananthan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, King Abdulaziz University, Jeddah 21589, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2019,2,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Niu, B., Zhang, Z., Li, X., and Li, H. (2014, January 10\u201314). Privacy-area aware dummy generation algorithms for location-based services. Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia.","DOI":"10.1109\/ICC.2014.6883443"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","article-title":"A survey of computational location privacy","volume":"13","author":"Krumm","year":"2009","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Gruteser, M., and Grunwald, D. (2003, January 5\u20138). Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, San Francisco, CA, USA.","DOI":"10.1145\/1066116.1189037"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Albelaihy, A., Cazalas, J., and Thayananthan, V. (2017, January 26\u201327). Privacy preserving queries for LBS: Hash function secured (HFS). Proceedings of the 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, Saudi Arabia.","DOI":"10.1109\/Anti-Cybercrime.2017.7905254"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Albelaihy, A., Cazalas, J., and Thayananthan, V. (2017, January 26\u201327). A survey of the current trends of privacy techniques employed in protecting the Location privacy of users in LBSs. Proceedings of the 2nd International Conference on Anti-Cyber Crimes (ICACC), Abha, Saudi Arabia.","DOI":"10.1109\/Anti-Cybercrime.2017.7905256"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"5623","DOI":"10.1109\/TIT.2015.2450732","article-title":"Information-Theoretic Interactive Hashing and Oblivious Transfer to a Storage-Bounded Receiver","volume":"61","author":"Cachin","year":"2015","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Meyerowitz, J., and Choudhury Roy, R. (2009, January 20\u201325). Hiding stars with fireworks: Location privacy through camouflage. Proceedings of the 15th annual international conference on Mobile computing and networking, Beijing, China.","DOI":"10.1145\/1614320.1614358"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/CC.2013.6623499","article-title":"Pseudo-Location Updating System for privacy-preserving location-based services","volume":"10","author":"Niu","year":"2013","journal-title":"Chin. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Manweiler, J., Scudellari, R., and Cox, L.P. (2009, January 9\u201313). Smile: Encounter-based trust for mobile social services. Proceedings of the 16th ACM conference on Computer and communications security, Chicago, IL, USA.","DOI":"10.1145\/1653662.1653692"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Le Boudec, J.-Y., and Hubaux, J.-P. (2011, January 22\u201325). Quantifying location privacy. Proceedings of the 2011 IEEE Symposium on Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/SP.2011.18"},{"key":"ref_11","unstructured":"W3C (2018, October 05). Platform for Privacy Preferences (P3P) Project. Available online: http:\/\/www.w3.org\/P3P\/."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Lu, H., Jensen, C.S., and Yiu, M.L. (2008, January 13). Pad: Privacy-area aware, dummy based location privacy in mobile service. Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, Vancouver, BC, Canada.","DOI":"10.1145\/1626536.1626540"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/s10707-009-0099-y","article-title":"A peer-to-peer spatial cloaking algorithm for anonymous location-based service","volume":"15","author":"Chow","year":"2009","journal-title":"GeoInformatica"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Bilogrevic, I., Jadliwala, M., Kalkan, K., Hubaux, J.-P., and Aad, I. (2011, January 27\u201329). Privacy in mobile computing for location-sharing-based services. Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium, Waterloo, ON, Canada.","DOI":"10.1007\/978-3-642-22263-4_5"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., and Vaikuntanathan, V. (2014, January 12\u201314). Lattice-based FHE as secure as PKE. Proceedings of the 5th conference on Innovations in theoretical computer science, Princeton, NJ, USA.","DOI":"10.1145\/2554797.2554799"},{"key":"ref_17","first-page":"5","article-title":"Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE)","volume":"2015","author":"Devadas","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Naehrig, M., Lauter, K., and Vaikuntanathan, V. (2011, January 21). Can homomorphic encryption be practical?. Proceedings of the 3rd ACM workshop on cloud computing security workshop, Chicago, IL, USA.","DOI":"10.1145\/2046660.2046682"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Mudda, S., and Giordano, S. (2014, January 24\u201328). Mobile P2P queries over temporal data in Pervasive Computing and Communications Workshops (PERCOM Workshops). Proceedings of the IEEE International Conference on Pervasive Computing and Communication Workshops, Budapest, Hungary.","DOI":"10.1109\/PerComW.2014.6815217"},{"key":"ref_20","first-page":"4964","article-title":"A Survey: The current trends of privacy techniques for protecting the location privacy of users in LBS","volume":"96","author":"Albelaihy","year":"2018","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1016\/j.csi.2015.06.001","article-title":"An efficient and privacy-preserving location sharing mechanism","volume":"44","author":"Shen","year":"2016","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Albelaihy, A., Cazalas, J., and Thayananthan, V. (2018). BLOT: A Novel Phase Privacy Preserving Framework for Location-Based Services. Int. J. Adv. Comput. Sci. Appl., 9.","DOI":"10.14569\/IJACSA.2018.090513"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Cox, L.P., Dalton, A., and Marupadi, V. (2007, January 11\u201313). Smokescreen: Flexible privacy controls for presence-sharing. Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, San Juan, Puerto Rico.","DOI":"10.1145\/1247660.1247688"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Puttaswamy, K.P., and Zhao, B.Y. (2010, January 22\u201323). Preserving privacy in location-based mobile social applications. Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, Annapolis, Maryland.","DOI":"10.1145\/1734583.1734585"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wei, W., Xu, F., and Li, Q. (2012, January 25\u201330). Mobishare: Flexible privacy-preserving location sharing in mobile online social networks. Proceedings of the INFOCOM, Orlando, FL, USA.","DOI":"10.1109\/INFCOM.2012.6195664"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Liu, Z., Li, J., Chen, J., and Jia, C. (2013, January 28\u201330). New privacy-preserving location sharing system for mobile online social networks. Proceedings of the Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Compiegne, France.","DOI":"10.1109\/3PGCIC.2013.38"},{"key":"ref_27","first-page":"25","article-title":"Mobishare+: Security improved system for location sharing in mobile online social networks","volume":"4","author":"Li","year":"2014","journal-title":"J. Internet Serv. Inf. Secure."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-319-08344-5_8","article-title":"Tmds: thin-model data sharing scheme supporting keyword search in cloud storage","volume":"8544","author":"Liu","year":"2014","journal-title":"Inform. Secur. Privacy"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.knosys.2014.04.010","article-title":"L-encdb: A lightweight framework for privacy-preserving data queries in cloud computing","volume":"79","author":"Li","year":"2015","journal-title":"Knowl. Based Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.jnca.2014.07.001","article-title":"New order-preserving encryption model for outsourced databases in cloud environments","volume":"59","author":"Liu","year":"2016","journal-title":"J. Network Comput. Appl."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Palmieri, P., Calderoni, L., and Maio, D. (2014, January 13\u201315). Spatial bloom filters: Enabling privacy in location-aware applications. Proceedings of the International Conference on Information Security and Cryptology, Beijing, China.","DOI":"10.1007\/978-3-319-16745-9_2"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"24","DOI":"10.5296\/npa.v7i1.6240","article-title":"A Bloom Filter with the Integrated Hash Table Using an Additional Hashing Function","volume":"7","author":"Ahmadi","year":"2015","journal-title":"Network Protoc. Algorithms"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.comcom.2015.06.011","article-title":"Location privacy without mutual trust: The spatial Bloom filter","volume":"68","author":"Calderoni","year":"2015","journal-title":"Comput. Commun."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Dong, C., Chen, L., and Wen, Z. (2013, January 4\u20138). When private set intersection meets big data: An efficient and scalable protocol. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, Berlin, Germany.","DOI":"10.1145\/2508859.2516701"},{"key":"ref_35","first-page":"3578","article-title":"Privcy-preserving queries for LBS: Independent secured hash function","volume":"96","author":"Albelaihy","year":"2018","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/CC.2014.6969711","article-title":"A location privacy preserving solution to resist passive and active attacks in VANET","volume":"11","author":"Zhu","year":"2014","journal-title":"Chin. Commun."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1109\/TPDS.2014.2319211","article-title":"Home-Based Zero-Knowledge Multi-Copy Routing in Mobile Social Networks","volume":"26","author":"Xiao","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Sys."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1002\/sec.1066","article-title":"An enhanced Kerberos protocol with non-interactive zero-knowledge proof","volume":"8","author":"Zhu","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Jagwani, P., and Kaushik, S. (2012, January 23\u201326). Defending Location Privacy Using Zero Knowledge Proof Concept in Location Based Services. Proceedings of the IEEE 13th International Conference on Mobile Data Management, Bengaluru, India.","DOI":"10.1109\/MDM.2012.23"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Kotzanikolaou, P., Magkos, E., Petrakos, N., Douligeris, C., and Chrissikopoulos, V. (2012). Fair anonymous authentication for location-based services. Lecture Notes in Computer Science, Springer.","DOI":"10.1007\/978-3-642-35890-6_1"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Mainanwal, V., Gupta, M., and Upadhayay, S.K. (2015, January 4\u20136). Zero-Knowledge Protocol with RSA Cryptography Algorithm for Authentication in Web Browser Login System (Z-RSA). Proceedings of the Fifth International Conference on Communication Systems and Network Technologies, Gwalior, India.","DOI":"10.1109\/CSNT.2015.90"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Brickell, E., Camenisch, J., and Chen, L. (2004, January 25\u201329). Direct anonymous attestation. Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA.","DOI":"10.1145\/1030083.1030103"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Backes, M., Maffei, M., and Unruh, D. (2008, January 18\u201322). Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA.","DOI":"10.1109\/SP.2008.23"},{"key":"ref_44","unstructured":"Hashem, T., Datta, S., Islam, T.U., Ali, M.E., Kulik, L., and Tanin, E. (June, January 31). A Unified Framework for Authenticating Privacy-Preserving Location Based Services. Proceedings of the Second International ACM Workshop on Managing and Mining Enriched Geo-Spatial Data, Melbourne, Australia."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Smyth, B., Chen, L., and Ryan, M.D. (2007, January 2\u20133). Direct anonymous attestation: Ensuring privacy with corrupt administrators. Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks, Cambridge, UK.","DOI":"10.1007\/978-3-540-73275-4_16"},{"key":"ref_46","first-page":"1049","article-title":"A Review of Wireless Sensor Network on Localization Techniques","volume":"4","author":"Garg","year":"2013","journal-title":"Int. J. Eng. Trends Technol."},{"key":"ref_47","unstructured":"Khadim, R., Erritali, M., and Maaden, A. (April, January 29). A Hierarchical Location-Based Services for Wireless Sensor Networks. Proceedings of the 13th International Conference on Computer Graphics, Imaging and Visualization, Beni Mellal, Morocco."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Jang, S., and Lee, C. (2018). The Impact of Location-Based Service Factors on Usage Intentions for Technology Acceptance: The Moderating Effect of Innovativeness. Sustainability, 10.","DOI":"10.3390\/su10061876"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Hasan, A., Qu, Q., Li, C., Chen, L., and Jiang, Q. (2018). An Effective Privacy Architecture to Preserve User Trajectories in Reward-Based LBS Applications. ISPRS, 7.","DOI":"10.3390\/ijgi7020053"},{"key":"ref_50","unstructured":"Wikipedia (2018, November 01). Zero-knowledge proof. Available online: https:\/\/en.wikipedia.org\/wiki\/Zero-knowledge_proof#Abstract."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1016\/j.phpro.2012.03.210","article-title":"Improvement of AODV Routing Protocol with QoS Support in Wireless Mesh Networks","volume":"25","author":"Liu","year":"2012","journal-title":"Physics Procedia"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Ren, K. (2012). Exploiting Pairing-Based Zero Knowledge Proof (ZKP) for Tactical Network Authentication, Illinois Inst of Tech Chicago Department of Electrical and Computer Engineering Dtic. Technical Report.","DOI":"10.21236\/ADA558415"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Ben-Sasson, E., Chiesa, A., Genkin, D., Tromer, E., and Virza, M. (2013, January 18\u201322). SNARKs for C: Verifying program executions succinctly and in zero knowledge. Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"ref_54","first-page":"1468","article-title":"Password Authentication for multicast host using zero knowledge Proof","volume":"5","author":"Ranganathan","year":"2015","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Hwang, R.-H., Hsueh, Y.-L., and Chung, H.-W. (2012). A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Trans. Serv. Comput., 208\u2013215.","DOI":"10.1109\/I-SPAN.2012.35"},{"key":"ref_56","unstructured":"Khan, A.M.R., Hashem, T., Tanin, E., and Kulik, L. (2012, January 13\u201315). Location Oblivious Privacy. Proceedings of the 12th International Symposium on Pervasive Systems, Algorithms and Networks, San Marcos, TX, USA."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Zhang, W., Liu, S., and Xiaoyuan, Y. (2013, January 9\u201311). RLWE-Based Homomorphic Encryption and Private Information Retrieval. Proceedings of the 5th International Conference on Intelligent Networking and Collaborative Systems, Xi\u2019an, China.","DOI":"10.1109\/INCoS.2013.100"},{"key":"ref_58","unstructured":"Kleyko, D., Rahimi, A., Gayler, R.W., and Osipov, E. (arXiv, 2017). Autoscaling Bloom Filter: Controlling Trade-off Between True and False Positives, arXiv."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Blum, M., Feldman, P., and Micali, S. (1988, January 2\u20134). Non-Interactive Zero-Knowledge and Its Applications. Proceedings of the twentieth annual ACM symposium on Theory of computing, Chicago, Illinois, USA.","DOI":"10.1145\/62212.62222"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Guillou, L.C., and Quisquater, J.J. (1990, January 1). A paradoxical\u201d identity-based signature scheme resulting from zero-knowledge. Proceedings of the CRYPTO \u201888 Proceedings on Advances in cryptology, Santa Barbara, CA, USA.","DOI":"10.1007\/0-387-34799-2_16"},{"key":"ref_61","unstructured":"Burton, D. (2011). The History of Mathematics: An Introduction, McGraw-Hill."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Ding, C., Pei, D., and Salomaa, A. (1996). Chinese Remainder Theorem: Applications in Computing, Coding. Cryptography, World Scientific Publishing Co., Inc.","DOI":"10.1142\/9789812779380"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Eigen, M. (2013). From Strange Simplicity to Complex Familiarity, Oxford University Press.","DOI":"10.1093\/acprof:oso\/9780198570219.001.0001"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/3\/696\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:30:44Z","timestamp":1760185844000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/3\/696"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,8]]},"references-count":63,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2019,2]]}},"alternative-id":["s19030696"],"URL":"https:\/\/doi.org\/10.3390\/s19030696","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2019,2,8]]}}}