浏览全部资源
扫码关注微信
1. 哈尔滨工程大学计算机科学与技术学院,黑龙江 哈尔滨 150001
2. 佳木斯大学信息电子技术学院,黑龙江 佳木斯 154007
[ "王斌(1979-),男,黑龙江安达人,哈尔滨工程大学博士生,佳木斯大学副教授,主要研究方向为机器学习、隐私保护。" ]
[ "张磊(1982-),男,黑龙江绥化人,博士,佳木斯大学副教授,主要研究方向为信息安全、隐私保护。" ]
[ "张国印(1962-),男,博士,山东黄县人,哈尔滨工程大学教授、博士生导师,主要研究方向为嵌入式系统与体系结构、网络技术与信息安全。" ]
网络出版日期:2019-04,
纸质出版日期:2019-04-25
移动端阅览
王斌, 张磊, 张国印. 基于多方安全计算的属性泛化mix-zone[J]. 通信学报, 2019,40(4):83-94.
Bin WANG, Lei ZHANG, Guoyin ZHANG. Attribute generalization mix-zone based on multiple secure computation[J]. Journal on communications, 2019, 40(4): 83-94.
王斌, 张磊, 张国印. 基于多方安全计算的属性泛化mix-zone[J]. 通信学报, 2019,40(4):83-94. DOI: 10.11959/j.issn.1000-436x.2019077.
Bin WANG, Lei ZHANG, Guoyin ZHANG. Attribute generalization mix-zone based on multiple secure computation[J]. Journal on communications, 2019, 40(4): 83-94. DOI: 10.11959/j.issn.1000-436x.2019077.
针对路网环境下mix-zone无法有效地实现属性进行隐藏或泛化和抵御伪装攻击的问题,基于属性泛化和同态加密,提出了一种秘态属性泛化的隐私保护方法。该方法通过同态加密,实现了秘密出价选择计算代理、秘密计算相似属性,并以相似属性完成属性泛化的整体处理。通过属性泛化,解决了mix-zone可被攻击者利用属性追踪的问题,同时秘密计算的属性处理不会泄露任何信息给参与者,也防止伪装攻击者获得mix-zone中各用户的隐私信息。最后,通过安全性分析和实验验证分别在理论和实践这2个方面对所提算法的优势加以分析和比较。
In order to cope with the problems of resist the attack of user tracking with attributes and resist the disguised attack in road networks
based on the conception of attribute generalization and the methods of homomorphic encryption
a privacy protection method to complete the calculation of attribute generalization in private state and achieve attribute generalization was proposed.The proposed method utilized the homomorphic encryption to achieve secret bidding selection with an agent
and then utilize secure multi-party computation to calculate the similar attributes and achieve the attribute generalization in the end.With the help of fully attribute generalization
this method can solve the problem of users can be tracked by the potential attributes
and at the same time the privacy calculation also does not reveal any information to participants
so this method can prevent the disguised attacker that obtains user’s information in mix-zone.At last
in order to demonstrate the superiority of the proposed method in both of academically and practicality
the security analysis and experimental verification are given
and the procedure of formulation verification and the result of experiment further substantiate the superiorities of the proposed method.
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking [C ] // International Conference on Mobile Systems,Applications and Services . ACM , 2003 : 31 - 42 .
GEDIK B , LING L . Location privacy in mobile systems:a personalized anonymization model [C ] // International Conference on Distributed Computing Systems . IEEE , 2005 : 620 - 629 .
BAMBA B , LIU L , PESTI P , et al . Supporting anonymous location queries in mobile environments with privacygrid [C ] // International Conference on World Wide Web . ACM , 2008 : 237 - 246 .
FUYU L , HUA K A , YING C . Query l-diversity in location-based services [C ] // International Conference on Mobile Data Management:Systems,Services and Middleware . ACM , 2009 : 436 - 442 .
NIU B , ZHU X Y , LI Q H , et al . A novel attack to spatial cloaking schemes in location-based services [J ] . Future Generation Computer Systems-the International Journal of Grid Computing and Escience , 2015 , 49 ( 2015 ): 125 - 132 .
FEI F , LI S , DAI H , et al . A K-anonymity based schema for location privacy preservation [J ] . 2017 ,P( 99 ):1.
SUN Y M , CHEN M , HU L , et al . ASA:against statistical attacks for privacy-aware users in Location Based Service [J ] . Future Generation Computer Systems-the International Journal of Escience , 2017 , 70 : 48 - 58 .
YE A Y , LI Y , XU L . A novel location privacy-preserving scheme based on l-queries for continuous LBS [J ] . Computer Communications , 2017 , 2017 ( 98 ): 1 - 10 .
PENG T , LIU Q , MENG D C , et al . Collaborative trajectory privacy preserving scheme in location-based services [J ] . Information Sciences , 2017 , 387 : 165 - 179 .
WANG Y , XIA Y , HOU J , et al . A fast privacy-preserving framework for continuous location-based queries in road networks [J ] . Journal of Network and Computer Applications , 2015 , 53 ( 2015 ): 57 - 73 .
ZEBERGA K , JIN R , CHO H J , et al . A safe-region approach to a moving k-RNN queries in a directed road network [J ] . Journal of Circuits Systems and Computers , 2017 , 26 ( 5 ): 1 - 18 .
SEPAHKAR M , KHAYYAMBASHI M . A novel collaborative approach for location prediction in mobile networks [J ] . Wireless Networks , 2018 , 24 ( 1 ): 283 - 294 .
YING B , MAKRAKIS D , MOUFTAH H T . Dynamic mix-zone for location privacy in vehicular networks [J ] . IEEE Communications Letters , 2013 , 17 ( 8 ): 1524 - 1527 .
PALANISAMY B , RAVICHANDRAN S , LIU L , et al . Road network mix-zones for anonymous location based services [C ] // International Conference on Data Engineering . IEEE , 2013 : 1300 - 1303 .
PALANISAMY B , LIU L . Effective mix-zone anonymization techniques for mobile travelers [J ] . Geoinformatica , 2014 , 18 ( 1 ): 135 - 164 .
KANG J W , YU R , HUANG X M , et al . Location privacy attacks and defenses in cloud-enabled internet of vehicles [J ] . IEEE Wireless Communications , 2016 , 23 ( 5 ): 52 - 59 .
ARAIN Q A , DENG Z L , MEMON I , et al . Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks [J ] . Wireless Personal Communications , 2017 , 95 ( 2 ): 505 - 521 .
ZHANG L . OTIBAAGKA:a new security tool for cryptographic mix-zone establishment in vehicular Ad Hoc networks [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 12 ( 12 ): 2998 - 3010 .
张磊 , 马春光 , 杨松涛 , 等 . 基于轮廓泛化的位置隐私保护模型及方法 [J ] . 系统工程与电子技术 , 2016 , 38 ( 12 ): 2894 - 2900 .
ZHANG L , MA C G , YANG S T , et al . Location privacy protection model and algorithm based on profiles generalization [J ] . Systems Engineering and Electronics , 2016 , 38 ( 12 ): 2894 - 2900 .
张磊 , 马春光 , 杨松涛 , 等 . 基于属性基加密的用户协作连续查询限私保护策略 [J ] . 通信学报 , 2017 , 38 ( 9 ): 76 - 85 .
ZHANG L , MA C G , YANG S T , et al . CP-ABE based users collaborative privacy protection scheme for continuous query [J ] . Journal on Communications , 2017 , 38 ( 9 ): 76 - 85 .
ZHANG L , YANG S , LI J , et al . A particle swarm optimization clustering-based attribute generalization privacy protection scheme [J ] . Journal of Circuits,Systems and Computers , 2018 , 27 ( 11 ): 171 - 121 .
DARGAHI T , AMBROSIN M , CONTI M , et al . ABAKA:a novel attribute-based k-anonymous collaborative solution for LBSs [J ] . Computer Communications , 2016 , 85 ( 2016 ): 1 - 13 .
汤全有 , 马传贵 , 光焱 . 基于全同态加密的秘密数据比较方案 [J ] . 信息工程大学学报 , 2012 , 13 ( 6 ): 654 - 657 .
TANG Q Y , MA C G , GUANG Y . Comparing private numbers based on fully homomorphic encryption [J ] . Journal of Information Engineering University , 2012 , 13 ( 6 ): 654 - 663 .
WANG X F , MU Y , CHEN R M . One-round privacy-preserving meeting location determination for smartphone applications [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 8 ): 1723 - 1732 .
PALANISAMY B , LIU L , LEE K , et al . Anonymizing continuous queries with delay-tolerant mix-zones over road networks [J ] . Distributed and Parallel Databases , 2014 , 32 ( 1 ): 91 - 118 .
PALANISAMY B , LIU L . Attack-resilient mix-zones over road networks:architecture and algorithms [J ] . IEEE Transactions on Mobile Computing , 2015 , 14 ( 3 ): 495 - 508 .
0
浏览量
734
下载量
8
CSCD
关联资源
相关文章
相关作者
相关机构