浏览全部资源
扫码关注微信
1. 南开大学计算机与控制工程学院,天津 300350
2. 中国民航大学信息安全测评中心,天津 300300
[ "沈楠(1980-),男,天津人,南开大学博士生、讲师,主要研究方向为信息安全、可信计算、密码学及应用等。" ]
[ "贾春福(1967-),男,河北文安人,博士,南开大学教授、博士生导师,主要研究方向为信息安全与可信计算、恶意代码发现与分析。" ]
[ "梁爽(1992-),女,天津人,南开大学硕士生,主要研究方向为信息安全、隐私保护、应用密码学等。" ]
[ "李瑞琪(1993-),男,吉林德惠人,南开大学博士生,主要研究方向为密码学理论、密码技术应用等。" ]
[ "刘哲理(1978-),男,山东潍坊人,博士,南开大学副教授,主要研究方向为密码学及应用、智能卡操作系统。" ]
网络出版日期:2017-07,
纸质出版日期:2017-07-25
移动端阅览
沈楠, 贾春福, 梁爽, 等. 基于保序加密的网格化位置隐私保护方案[J]. 通信学报, 2017,38(7):78-88.
Nan SHEN, Chun-fu JIA, Shuang LIANG, et al. Approach of location privacy protection based on order preserving encryption of the grid[J]. Journal on communications, 2017, 38(7): 78-88.
沈楠, 贾春福, 梁爽, 等. 基于保序加密的网格化位置隐私保护方案[J]. 通信学报, 2017,38(7):78-88. DOI: 10.11959/j.issn.1000-436x.2017146.
Nan SHEN, Chun-fu JIA, Shuang LIANG, et al. Approach of location privacy protection based on order preserving encryption of the grid[J]. Journal on communications, 2017, 38(7): 78-88. DOI: 10.11959/j.issn.1000-436x.2017146.
集中式可信第三方结构是基于位置的服务中常用的隐私保护结构。然而,一旦中心第三方服务器被攻破或不可信任,用户的位置隐私就有被泄露的风险。针对以上问题,提出一种用户自定义网格化的位置隐私保护方案,先将查询范围自动网格化处理,再结合保序加密技术,使用户的实时位置在隐藏状态下仍能进行比较。由于该方案在整个查询过程中,信息全程处于加密状态,服务器不知道任何用户的具体位置信息,增强了对用户位置隐私的保护;又由于该方案的中心第三方服务器只需要进行简单的比较操作,有效减少了它在处理大量数据时的时间开销。安全分析阐明了该方案的安全性,模拟实验结果表明该方案能够使中心服务器的时间开销明显降低。
The centralized structure of the trusted third party is a major privacy protection structure on location based services.However
if the central third party server can not be trusted or compromised
users have the risk of leakage of privacy location.Aiming at the above problems
location privacy protection approach based on a user-defined grid to hide location was proposed.The system first automatically converted the query area into a user-defined grid
and then the approach utilized order preserving encryption
which made the user’s real-time position in the hidden state could still be compared.Because the information in the process of the approach was in a state of encryption
the server could not know the user’s location information
thus improved privacy protection of the user location.The central third party server only need to do simple comparison work
so its processing time overhead would effectively decrease.Security analysis certificate the security of the proposed approach and simulation experimental show the proposed approach can reduce the time cost of the central third party server.
张学军 , 桂小林 , 伍忠东 . 位置服务隐私保护研究综述 [J ] . 软件学报 , 2015 , 26 ( 9 ): 2373 - 2395 .
ZHANG X J , GUI X L , WU Z D . Privacy preservation for locationbased services:a survey [J ] . Journal of Software , 2015 , 26 ( 9 ): 2373 - 2395 .
GAO S , MA J , SHI W , et al . TrPF:a trajectory privacy-preserving framework for participatory sensing [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 6 ): 874 - 887 .
KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location-based services [C ] // The 21st International Conference on Data Engineering Workshops . 2005 : 1248 - 1248 .
DEBNATH R , VELAN G S . Semi trusted third party using dynamic grid system for locationbased services [J ] . Networking and Communication Engineering , 2016 , 8 ( 5 ): 195 - 199 .
YI X , PAULET R , BERTINO E , et al . Practical approximate k nearest neighbor queries with location and query privacy [J ] . IEEE Transactions on Knowledge and Data Engineering , 2016 , 28 ( 6 ): 1546 - 1559 .
SCHLEGEL R , CHOW C Y , HUANG Q , et al . User-defined privacy grid system for continuous location-based services [J ] . IEEE Transactions on Mobile Computing , 2015 , 14 ( 10 ): 2158 - 2172 .
GENTRY C , HALEVI S . Hierarchical identity based encryption with polynomially many levels [C ] // Theory of Cryptography Conference . 2009 : 437 - 456 .
AGRAWAL R , KIERNAN J , SRIKANT R , et al . Order preserving encryption for numeric data [C ] // The 2004 ACM SIGMOD International Conference on Management of Data . 2004 : 563 - 574 .
BOLDYREVA A , CHENETTE N , LEE Y , et al . Order-preserving symmetric encryption [C ] // Annual International Conference on the Theory and Applications of Cryptographic Techniques . 2009 : 224 - 241 .
AHMADIAN M , PAYA A , MARINESCU D C . Security of applications involving multiple organizations and order preserving encryption in hybrid cloud environments [C ] // 2014 IEEE International Conference on Parallel & Distributed Processing Symposium Workshops (IPDPSW) . 2014 : 894 - 903 .
NARAYANAN A , SHMATIKOV V . De-anonymizing social networks [C ] // 2009 30th IEEE Symposium on Security and Privacy . 2009 : 173 - 187 .
PENG T , LIU Q , WANG G . Enhanced location privacy preserving scheme in location-based services [J ] . IEEE Systems Journal , 2014 , 11 ( 1 ): 219 - 230 .
0
浏览量
1004
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构