浏览全部资源
扫码关注微信
武警工程大学电子技术系,陕西 西安 710086
[ " 林曦(1992-),男,福建福清人,武警工程大学硕士生,主要研究方向为公钥密码学。" ]
[ "韩益亮(1977-),男,甘肃会宁人,博士,武警工程大学副教授、博士生导师,主要研究方向为公钥密码学与数据安全技术。" ]
[ "柯彦(1991-),男,河南南阳人,武警工程大学硕士生,主要研究方向为信息安全与信息隐藏。" ]
[ " 杨晓元(1959-),男,湖南湘潭人,武警工程大学教授、博士生导师,主要研究方向为密码学与信息隐藏。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
林曦, 韩益亮, 柯彦, 等. 抵抗SNS好友攻击的位置隐私保护方案[J]. 通信学报, 2016,37(Z1):224-230.
Xi LIN, Yi-liang HAN, Yan KE, et al. Location privacy preserving scheme against attack from friends in SNS[J]. Journal on communications, 2016, 37(Z1): 224-230.
林曦, 韩益亮, 柯彦, 等. 抵抗SNS好友攻击的位置隐私保护方案[J]. 通信学报, 2016,37(Z1):224-230. DOI: 10.11959/j.issn.1000-436x.2016271.
Xi LIN, Yi-liang HAN, Yan KE, et al. Location privacy preserving scheme against attack from friends in SNS[J]. Journal on communications, 2016, 37(Z1): 224-230. DOI: 10.11959/j.issn.1000-436x.2016271.
为了丰富用户的位置信息的表现模式,适应多样化的用户需求,基于属性加密设计了一种支持精确、较精确、模糊以及不公开位置信息共4种模式的位置隐私保护方案。以WT-CP-ABE算法为基础,将位置信息根据好友的亲密度等级分成3个部分。采用属性加密和对称加密的方法分别对密钥信息和位置信息进行加密,在社交网络上发布。对方案的安全性进行分析,表明方案具有用户属性信息机密性、数据机密性和可抵抗合谋攻击的优点。
In order to enrich the performance of the user's location information and to meet the diverse needs of users
a location privacy protection scheme based on attribute encryption was designed
which provided precise
more accurate
fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade
then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed
which shows that the scheme has the advantage of user attribute information confidentiality
data confidentiality and can resist the collusion attack.
CHOW C Y , MOKBEL M F , AREF W G . Casper:query processing for location services without compromising privacy[C]//32nd Interna-tional Conference on Very Large Data Bases . 2006 : 763 - 774 .
KIDO H , YANAGISAWA Y , SATOH T . An anonymous communica-tion technique using dummies for location-based ser-vices[C]//Pervasive Services . 2005 : 88 - 97 .
MAN L Y , JENSEN C S , HUANG X , et al . SpaceTwist:managing the trade-offs among location privacy,query performance,and query ac-curacy in mobile services [J ] . Icde , 2008 : 366 - 375 .
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]//International Confer-ence on Mobile Systems,Applications,and Services . 2003 : 31 - 42 .
陈伟鹤 , 李文静 , 朱江 . 基于社交网络好友攻击的位置隐私保护模型 [[J ] . 计算机工程与科学 , 2015 , 37 ( 4 ): 692 - 698 .
CHEN W H , LI W J , ZHU J . A model for protecting location privacy against attacks from friends in SNS [J ] . Computer Engineering&Sci-ence , 2015 , 37 ( 4 ): 692 - 698 .
BONEH D , FRANKLIN F . Identity-based encryption from the Wail pairing [J ] . Advances in Cryptology-Crypt , 2001 , 32 ( 3 ): 586 - 615 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attrib-ute-based encryption[C]//28th International Symposium on Security and Privacy(S&P2007) . Berkeley,CA,USA , 2007 : 321 - 334 .
BEIMEL A . Secure schemes for secret sharing and key distribution [J ] . International Journal of Pure&Applied Mathematics , 1996 .
WATERS B . Ciphertext-policy attribute-based encryption:an expres-sive,efficient,and provably secure realization [J ] . Lecture Notes in Computer Science , 2011 : 321 - 334 .
LIANG X , LI X , LU R , et al . An efficient and secure user revocation scheme in mobile social networks[C]//Global Telecommunications Conference (GLOBECOM 2011) . 2011 : 1 - 5 .
HUR J , NOH D K . Attribute-based access control with efficient revo-cation in data outsourcing systems [J ] . IEEE Transactions on Parallel &Distributed Systems , 2010 , 22 ( 7 ): 1214 - 1221 .
吕志泉 , 洪澄 , 张敏 , 等 . 面向社交网络的隐私保护方案 . 通信学报 , 2014 , 35 ( 8 ): 23 - 32 .
LYU Z Q , HONG C , ZHANG M , et al . Privacy-perserving scheme for social networks [J ] . Journal on Communications , 2014 , 35 ( 8 ): 23 - 32 .
YU S , WANG C , REN K , et al . Attribute based data sharing with attribute revocation[C]//5th ACM Symposium on Information,Com-puter and Communications Security . Beijing,China , 2010 : 261 - 270 .
JAHID S , MITTAL P , BORISOV N . EASiER:Encryption-based access control in social networks with efficient revocation[C]//ACM Symposium on Information,Computer and Communications Security . 2011 : 411 - 415 .
ZHANG M , LYU Z , FENG D , et al . A secure and efficient revocation scheme for fine-grained access control in cloud storage[C]//2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom) . 2012 : 545 - 550 .
0
浏览量
640
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构