浏览全部资源
扫码关注微信
1. 哈尔滨工程大学计算机科学与技术学院,黑龙江 哈尔滨 150001
2. 佳木斯大学信息电子技术学院,黑龙江 佳木斯 154007
[ "张磊(1982-),男,黑龙江绥化人,哈尔滨工程大学博士生,佳木斯大学讲师,主要研究方向为信息安全、隐私保护。" ]
[ "马春光(1974-),男,黑龙江双城人,博士,哈尔滨工程大学教授、博士生导师,主要研究方向为密码学、数据安全与隐私保护、无线自组织网络及安全。" ]
[ "杨松涛(1972-),男,黑龙江鹤岗人,博士,佳木斯大学教授,主要研究方向为信息安全、隐私保护。" ]
[ "李增鹏(1989-),男,山东青岛人,哈尔滨工程大学博士生,主要研究方向为密码学、密码协议。" ]
网络出版日期:2017-09,
纸质出版日期:2017-09-25
移动端阅览
张磊, 马春光, 杨松涛, 等. 基于属性基加密的用户协作连续查询隐私保护策略[J]. 通信学报, 2017,38(9):76-85.
Lei ZHANG, Chun-guang MA, Song-tao YANG, et al. CP-ABE based users collaborative privacy protection scheme for continuous query[J]. Journal on communications, 2017, 38(9): 76-85.
张磊, 马春光, 杨松涛, 等. 基于属性基加密的用户协作连续查询隐私保护策略[J]. 通信学报, 2017,38(9):76-85. DOI: 10.11959/j.issn.1000-436x.2017184.
Lei ZHANG, Chun-guang MA, Song-tao YANG, et al. CP-ABE based users collaborative privacy protection scheme for continuous query[J]. Journal on communications, 2017, 38(9): 76-85. DOI: 10.11959/j.issn.1000-436x.2017184.
在基于位置服务(LBS
location-based service)中,不可信的服务器可利用掌握的用户属性信息作为背景知识,在快照或连续查询过程中关联不确定位置集合中的位置,进而识别出潜在的用户真实位置造成用户位置隐私的泄露。针对这种攻击行为,当前主要的隐私保护方法是进行属性泛化。然而,已有的属性泛化方法一般假设存在一个可信的第三方服务器对参与匿名用户的属性进行寻找与比较,而这个第三方服务器很可能因为攻击焦点或服务瓶颈问题变得不再可信。针对攻击者可能使用的用户属性进行分析攻击以及第三方服务器潜在的不可信问题,提出一种基于属性基加密(CP-ABE
ciphertext policy attribute based encryption)的方法,通过用户协作完成对用户属性的匿名操作,并且整个过程中第三方服务器以及协作用户无法获知该用户任何隐私信息。最后,安全性分析和实验验证进一步证明了所提方法具有较高的隐私保护效力和算法执行效率。
In location-based services (LBS)
as the untrusted LBS server can be seen as an adversary
and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack
the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However
algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing
and it is unpractical in the real environment
as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus
to cope with the correlation inference attack as well as the semi-trusted third party
ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme
the user coupled achieve location and attribute anonymity.Furthermore
this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last
security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.
马春光 , 张磊 , 杨松涛 . 位置轨迹隐私保护综述 [J ] . 信息网络安全 , 2015 ( 10 ): 24 - 31 .
MA C G , ZHANG L , YANG S T . Review on location trajectory privacy protection [J ] . Netinfo Security , 2015 ( 10 ): 24 - 31 .
WANG Y , XIA Y , HOU J , et al . A fast privacy-preserving framework for continuous location-based queries in road networks [J ] . Journal of Network and Computer Applications , 2015 , 53 : 57 - 73 .
LIN C , WU G W , YU C W . Protecting location privacy and query privacy:a combined clustering approach [J ] . Concurrency and Computation-Practice & Experience , 2015 , 27 ( 12 ): 3021 - 3043 .
周长利 , 马春光 , 杨松涛 . 基于敏感位置多样性的LBS位置隐私保护方法研究 [J ] . 通信学报 , 2015 , 36 ( 4 ): 129 - 140 .
ZHOU C L , MA C G , YANG S T . Research of LBS privacy preserving based on sensitive location diversity [J ] . Journal on Communications , 2015 , 36 ( 4 ): 129 - 140 .
NIU B , GAO S , LI F H , et al . Protection of location privacy in continuous LBSs against adversaries with background information [C ] // 2016 International Conference on Computing,Networking and Communications (ICNC) . 2016 .
GAO S , MA J F , SHI W S , et al . LTPPM:a location and trajectory privacy protection mechanism in participatory sensing [J ] . Wireless Communications & Mobile Computing , 2015 , 15 ( 1 ): 155 - 169 .
HWANG R H , HSUEH Y L , CHUNG H W . A novel time-obfuscated algorithm for trajectory privacy protection [J ] . IEEE Transactions on Services Computing , 2014 , 7 ( 2 ): 126 - 139 .
NI W , GU M , CHEN X . Location privacy-preserving k nearest neighbor query under user's preference [J ] . Knowledge-Based Systems , 2016 , 103 : 19 - 27 .
张磊 , 马春光 , 杨松涛 , 等 . 基于轮廓泛化的位置隐私保护模型及方法 [J ] . 系统工程与电子技术 , 2016 , 38 ( 12 ): 2894 - 900 .
ZHANG L , MA C G , YANG S T , et al . Location privacy protection model and algorithm based on profiles generalization [J ] . Systems Engineering and Electronics , 2016 , 38 ( 12 ): 2894 - 2900 .
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking [C ] // 1st International Conference on Mobile Systems,Applications and Services . San Francisco,California,F , 2003 :1189037.
XIAO Z , XU J , MENG X . P-sensitivity:a semantic privacy-protection model for location-based services [C ] // International Conference on Mobile Data Management Workshops . 2008 .
FUYU L , HUA K A , YING C . Query l-diversity in location-based services [C ] // Mobile Data Management:Systems,Services and Middleware . 2009 .
CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service [C ] // 14th Annual ACM International Symposium on Advances in Geographic Information Systems . 2006 : 171 - 178 .
MA C , ZHANG L , YANG S , et al . Achieve personalized anonymity through query blocks exchanging [J ] . China Communications , 2016 , 13 ( 11 ): 106 - 18 .
GHINITA G , KALNIS P , KHOSHGOZARAN A , et al . Private queries in location based services:anonymizers are not necessary [C ] // 2008 ACM SIGMOD International Conference on Management of data . 2008 : 121 - 32 .
KATO R , IWATA M , HARA T , et al . A dummy-based anonymization method based on user trajectory with pauses [C ] // 20th International Conference on Advances in Geographic Information Systems . 2012 .
GHASEMZADEH M , FUNG B C M , CHEN R , et al . Anonymizing trajectory data for passenger flow analysis [J ] . Transportation Research Part C-Emerging Technologies , 2014 , 39 ( 2014 ): 63 - 79 .
PALANISAMY B , LIU L , LEE K , et al . Anonymizing continuous queries with delay-tolerant mix-zones over road networks [J ] . Distributed and Parallel Databases , 2014 , 32 ( 1 ): 91 - 118 .
张磊 , 马春光 , 杨松涛 . 基于位置关联相似性的匿名算法 [J ] . 中国科技论文 , 2016 , 11 ( 2 ): 197 - 201 ,13.
ZHANG L , MA C G , YANG S T . Location association similar based anonymus algorithm [J ] . China Sciencepaper , 2016 , 11 ( 2 ): 197 - 201 ,13.
马春光 , 周长利 , 杨松涛 , 等 . 基于 Voronoi 图预划分的 LBS 位置隐私保护方法 [J ] . 通信学报 , 2015 , 36 ( 5 ): 5 - 16 .
MA C G , ZHOU C L , YANG S T , et al . Location privacy-preserving method in LBS based on Voronoi division [J ] . Journal on Communications , 2015 , 36 ( 5 ): 5 - 16 .
RODRIGUEZ-CARRION A , REBOLLO-MONEDERO D , FORNE J , et al . Entropy-based privacy against profiling of user mobility [J ] . Entropy , 2015 , 17 ( 6 ): 3913 - 3946 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // IEEE Symposium on Security and Privacy . 2007 .
0
浏览量
1010
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构