Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center

被引:1
|
作者
Lian, Bin [1 ]
Cui, Jialin [1 ]
Chen, Hongyuan [2 ]
Zhao, Xianghong [1 ]
Wang, Fuqun [3 ]
Chen, Kefei [3 ]
Ma, Maode [4 ]
机构
[1] NingboTech Univ, Sch Informat Sci & Engn, Ningbo 315100, Peoples R China
[2] NingBo AiSino Co Ltd, Ningbo 315048, Peoples R China
[3] Hangzhou Normal Univ, Sch Math, Hangzhou 310030, Peoples R China
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Jurong West, Singapore
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things; Data privacy; Privacy; Cryptography; Behavioral sciences; Security; Clone attack; enhanced privacy protection; location-based service (LBS); truly decentralized anonymous authentication; trusted location sharing; ANONYMOUS AUTHENTICATION; EFFICIENT REVOCATION; SYSTEM; INTERNET;
D O I
10.1109/JIOT.2023.3336337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many IoT applications require users to share their devices' location, and enhanced privacy-protection means sharing location anonymously, unlinkably and without relying on any administrators. But under such protection, it is difficult to trust shared location data, which may be from unregistered devices or from the same one's multiple logins or from the cloned device ID, even be generated by an attacker without any devices! Such untrusted location sharing cheats system, misleads users, even attacks system. To the best of our knowledge, such problems have not been solved in a decentralized system. To solve them in one scheme, we put forward the first decentralized accumulator for device registration and construct the first practical decentralized anonymous authentication for device login. When logging in, the device provides a special knowledge proof, which integrates zero-knowledge (for privacy) with knowledge-leakage (for identifying abnormal behaviors) designing for blockchain (for decentralization). Therefore, in our system, only registered IoT devices can upload location data and their logins are anonymous and unlinkable, while login exceeding ${K}$ times in a system period or cloning ID to login concurrently can be identified and tracked without any trusted centers. In addition, we provide the security proofs and the application examples of the proposed scheme. And the efficiency analysis and experimental data show that the performance of our scheme can meet the needs of real-world location sharing on IoT.
引用
收藏
页码:12331 / 12345
页数:15
相关论文
共 50 条
  • [21] A PRIVACY PRESERVING CONTENT DISTRIBUTION MECHANISM FOR DRM WITHOUT TRUSTED THIRD PARTIES
    Win, Lei Lei
    Thomas, Tony
    Emmanuel, Sabu
    2011 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2011,
  • [22] TEBDS: A Trusted Execution Environment-and-Blockchain-supported IoT data sharing system
    Xie, Hui
    Zheng, Jun
    He, Teng
    Wei, Shengjun
    Hu, Changzhen
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 140 : 321 - 330
  • [23] Protection of Identity Information in Cloud Computing without Trusted Third Party
    Ranchal, Rohit
    Bhargava, Bharat
    Ben Othmane, Lotfi
    Lilien, Leszek
    Kim, Anya
    Kang, Myong
    Linderman, Mark
    2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010, 2010, : 368 - 372
  • [24] Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption
    Win, Lei Lei
    Thomas, Tony
    Emmanuel, Sabu
    IEEE TRANSACTIONS ON MULTIMEDIA, 2012, 14 (03) : 546 - 554
  • [25] A Privacy-Preserving Data Aggregation Scheme for Fog/Cloud-Enhanced IoT Applications Using a Trusted Execution Environment
    Will, Newton Carlos
    SYSCON 2022: THE 16TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2022,
  • [26] Dynamic Secure Access Control and Data Sharing Through Trusted Delegation and Revocation in a Blockchain-Enabled Cloud-IoT Environment
    Alshehri, Suhair
    Bamasaq, Omaimah
    Alghazzawi, Daniyal
    Jamjoom, Arwa
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (05) : 4239 - 4256
  • [27] Blockchain-Enhanced Data Privacy Preservation and Secure Sharing Scheme for Healthcare IoT
    Guan, Shaopeng
    Cao, Youliang
    Zhang, Yuan
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5600 - 5614
  • [28] Privacy-Preserving Collaborative Sharing for Sharing Economy in Fog-Enhanced IoT
    Bai, Wenle
    Huang, Aoran
    IEEE ACCESS, 2023, 11 : 95295 - 95306
  • [29] Privacy-Preserving Data Analysis without Trusted Third Party
    Miyaji, Atsuko
    Takahashi, Tomoka
    Wang, Ping-Lun
    Yamatsuki, Tatsuhiro
    Mimoto, Tomoaki
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 710 - 717
  • [30] Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party
    Lazrig, Ibrahim
    Ong, Toan C.
    Ray, Indrajit
    Ray, Indrakshi
    Jiang, Xiaoqian
    Vaidya, Jaideep
    2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 75 - 84