Location privacy preserving scheme against attack from friends in SNS
Correspondences|更新时间:2024-06-05
|
Location privacy preserving scheme against attack from friends in SNS
Journal on CommunicationsVol. 37, Issue Z1, Pages: 224-230(2016)
作者机构:
武警工程大学电子技术系,陕西 西安 710086
作者简介:
基金信息:
The National Natural Science Foundation of China(61572521);The National Natural Science Foundation of China(61272492);The National Natural Science Foundation of China(61272486);The Natural Science Basic Research Program of Shaanxi Province(2015JM6353)
Xi LIN, Yi-liang HAN, Yan KE, et al. Location privacy preserving scheme against attack from friends in SNS[J]. Journal on Communications, 2016, 37(Z1): 224-230.
DOI:
Xi LIN, Yi-liang HAN, Yan KE, et al. Location privacy preserving scheme against attack from friends in SNS[J]. Journal on Communications, 2016, 37(Z1): 224-230. DOI: 10.11959/j.issn.1000-436x.2016271.
Location privacy preserving scheme against attack from friends in SNS
In order to enrich the performance of the user's location information and to meet the diverse needs of users
a location privacy protection scheme based on attribute encryption was designed
which provided precise
more accurate
fuzzy and private four modes to manage the location information.The scheme was based on the algorithm of WT-CP-ABE.The location information was divided into three parts according to a close friend of grade
then the key infor-mation and position information was encrypted with attribute-based encryption and symmetric encryption method respec-tively and the ciphertext was published to the social network.The security of the scheme is analyzed
which shows that the scheme has the advantage of user attribute information confidentiality
data confidentiality and can resist the collusion attack.
关键词
Keywords
references
CHOW C Y , MOKBEL M F , AREF W G . Casper:query processing for location services without compromising privacy[C]//32nd Interna-tional Conference on Very Large Data Bases . 2006 : 763 - 774 .
KIDO H , YANAGISAWA Y , SATOH T . An anonymous communica-tion technique using dummies for location-based ser-vices[C]//Pervasive Services . 2005 : 88 - 97 .
MAN L Y , JENSEN C S , HUANG X , et al . SpaceTwist:managing the trade-offs among location privacy,query performance,and query ac-curacy in mobile services [J ] . Icde , 2008 : 366 - 375 .
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]//International Confer-ence on Mobile Systems,Applications,and Services . 2003 : 31 - 42 .
CHEN W H , LI W J , ZHU J . A model for protecting location privacy against attacks from friends in SNS [J ] . Computer Engineering&Sci-ence , 2015 , 37 ( 4 ): 692 - 698 .
BONEH D , FRANKLIN F . Identity-based encryption from the Wail pairing [J ] . Advances in Cryptology-Crypt , 2001 , 32 ( 3 ): 586 - 615 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attrib-ute-based encryption[C]//28th International Symposium on Security and Privacy(S&P2007) . Berkeley,CA,USA , 2007 : 321 - 334 .
BEIMEL A . Secure schemes for secret sharing and key distribution [J ] . International Journal of Pure&Applied Mathematics , 1996 .
LIANG X , LI X , LU R , et al . An efficient and secure user revocation scheme in mobile social networks[C]//Global Telecommunications Conference (GLOBECOM 2011) . 2011 : 1 - 5 .
HUR J , NOH D K . Attribute-based access control with efficient revo-cation in data outsourcing systems [J ] . IEEE Transactions on Parallel &Distributed Systems , 2010 , 22 ( 7 ): 1214 - 1221 .
LYU Z Q , HONG C , ZHANG M , et al . Privacy-perserving scheme for social networks [J ] . Journal on Communications , 2014 , 35 ( 8 ): 23 - 32 .
YU S , WANG C , REN K , et al . Attribute based data sharing with attribute revocation[C]//5th ACM Symposium on Information,Com-puter and Communications Security . Beijing,China , 2010 : 261 - 270 .
JAHID S , MITTAL P , BORISOV N . EASiER:Encryption-based access control in social networks with efficient revocation[C]//ACM Symposium on Information,Computer and Communications Security . 2011 : 411 - 415 .
ZHANG M , LYU Z , FENG D , et al . A secure and efficient revocation scheme for fine-grained access control in cloud storage[C]//2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom) . 2012 : 545 - 550 .