Privacy-enhanced distance computation with applications

被引:0
作者
Chen, Xiaojuan [1 ]
Mu, Yi [2 ]
Wang, Xiaofen [3 ]
Shi, Runhua [4 ]
机构
[1] Southwest Univ, Dept Informat Management, Rongchang Campus, Chongqing, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Ctr Comp & Informat Secur Res, Wollongong, NSW, Australia
[3] Univ Elect Sci & Technol China, Dept Comp Sci & Engn, Chengdu, Peoples R China
[4] Anhui Univ, Sch Comp Sci & Technol, Hefei, Peoples R China
基金
中国国家自然科学基金;
关键词
location privacy; security; confidentiality;
D O I
10.1504/IJESDF.2016.077448
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location privacy has been regarded as an important requirement for location-based service on mobile devices such as mobile phones, where location information might have to be protected against unauthorised or even authorised (curious-but-honest) parties in some cases. We propose a scheme, which provides a method for a location server to identify the nearest mobile object (amongst n mobile objects) to a target mobile object without revealing the location of any participant to the location server. We describe our protocol by using a practical application, where the aim is to identify a closest service vehicle among registered service vehicles to the target car which requires a service, while the locations of all participants are protected against the location server. Our scheme only requires an additive homomorphic encryption scheme without the need of fully homomorphic encryption as required by all other related schemes on location privacy.
引用
收藏
页码:234 / 249
页数:16
相关论文
共 19 条
  • [1] GLP: A cryptographic approach for group location privacy
    Ashouri-Talouki, Maede
    Baraani-Dastjerdi, Ahmad
    Selcuk, Ali Aydin
    [J]. COMPUTER COMMUNICATIONS, 2012, 35 (12) : 1527 - 1533
  • [2] Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
    Bilogrevic, Igor
    Jadliwala, Murtuza
    Joneja, Vishal
    Kalkan, Kubra
    Hubaux, Jean-Pierre
    Aad, Imad
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) : 1141 - 1156
  • [3] Cheng R, 2006, LECT NOTES COMPUT SC, V4258, P393
  • [4] Private information retrieval
    Chor, B
    Goldreich, O
    Kushilevitz, E
    Sudan, M
    [J]. JOURNAL OF THE ACM, 1998, 45 (06) : 965 - 982
  • [5] Chow CY, 2007, LECT NOTES COMPUT SC, V4605, P258
  • [6] Gahi Youssef, 2012, J INFORM SECURITY, V3, P105
  • [7] Location privacy in mobile systems: A personalized anonymization model
    Gedik, B
    Liu, L
    [J]. 25th IEEE International Conference on Distributed Computing Systems, Proceedings, 2005, : 620 - 629
  • [8] Ghinita G., 2008, P 2008 ACM SIGMOD IN
  • [9] Ghinita G, 2009, TRANS DATA PRIV, V2, P3
  • [10] Protecting privacy in continuous location-tracking applications
    Gruteser, M
    Liu, X
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (02) : 28 - 34