Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center

被引:1
|
作者
Lian, Bin [1 ]
Cui, Jialin [1 ]
Chen, Hongyuan [2 ]
Zhao, Xianghong [1 ]
Wang, Fuqun [3 ]
Chen, Kefei [3 ]
Ma, Maode [4 ]
机构
[1] NingboTech Univ, Sch Informat Sci & Engn, Ningbo 315100, Peoples R China
[2] NingBo AiSino Co Ltd, Ningbo 315048, Peoples R China
[3] Hangzhou Normal Univ, Sch Math, Hangzhou 310030, Peoples R China
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Jurong West, Singapore
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things; Data privacy; Privacy; Cryptography; Behavioral sciences; Security; Clone attack; enhanced privacy protection; location-based service (LBS); truly decentralized anonymous authentication; trusted location sharing; ANONYMOUS AUTHENTICATION; EFFICIENT REVOCATION; SYSTEM; INTERNET;
D O I
10.1109/JIOT.2023.3336337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many IoT applications require users to share their devices' location, and enhanced privacy-protection means sharing location anonymously, unlinkably and without relying on any administrators. But under such protection, it is difficult to trust shared location data, which may be from unregistered devices or from the same one's multiple logins or from the cloned device ID, even be generated by an attacker without any devices! Such untrusted location sharing cheats system, misleads users, even attacks system. To the best of our knowledge, such problems have not been solved in a decentralized system. To solve them in one scheme, we put forward the first decentralized accumulator for device registration and construct the first practical decentralized anonymous authentication for device login. When logging in, the device provides a special knowledge proof, which integrates zero-knowledge (for privacy) with knowledge-leakage (for identifying abnormal behaviors) designing for blockchain (for decentralization). Therefore, in our system, only registered IoT devices can upload location data and their logins are anonymous and unlinkable, while login exceeding ${K}$ times in a system period or cloning ID to login concurrently can be identified and tracked without any trusted centers. In addition, we provide the security proofs and the application examples of the proposed scheme. And the efficiency analysis and experimental data show that the performance of our scheme can meet the needs of real-world location sharing on IoT.
引用
收藏
页码:12331 / 12345
页数:15
相关论文
共 50 条
  • [41] A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server
    Xie, Hongcheng
    Guo, Yu
    Jia, Xiaohua
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3068 - 3081
  • [42] A trusted IoT data sharing and secure oracle based access for agricultural production risk management
    Manoj, T.
    Makkithaya, Krishnamoorthi
    Narendra, V. G.
    COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2023, 204
  • [43] Decaying Photos for Enhanced Privacy: User Perceptions Towards Temporal Redactions and 'Trusted' Platforms
    Pias S.B.H.
    Ahmad I.
    Akter T.
    Kapadia A.
    Lee A.J.
    Proceedings of the ACM on Human-Computer Interaction, 2022, 6 (CSCW2):
  • [44] Differential Privacy-Preserving IoT Data Sharing Through Enhanced PSO
    Dhavamani, Logeshwari
    Ananthavadivel, Devipriya
    Akilandeswari, P.
    Nanajappan, Manikandan
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [45] A novel (n, t, n) secret image sharing scheme without a trusted third party
    Guo, Cheng
    Chang, Chin-Chen
    Qin, Chuan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 72 (03) : 2195 - 2209
  • [46] A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins
    Huguenin, Kevin
    Bilogrevic, Igor
    Machado, Joana Soares
    Mihaila, Stefan
    Shokri, Reza
    Dacosta, Italo
    Hubaux, Jean-Pierre
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (04) : 760 - 774
  • [47] An Enhanced Location Scattering Based Privacy Protection Scheme
    Nisha, Nisha
    Natgunanathan, Iynkaran
    Xiang, Yong
    IEEE ACCESS, 2022, 10 : 21250 - 21263
  • [48] Fine-Grained Data Sharing With Enhanced Privacy Protection and Dynamic Users Group Service for the IoV
    Bao, Yangyang
    Qiu, Weidong
    Cheng, Xiaochun
    Sun, Jianfei
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (11) : 13035 - 13049
  • [49] Trusted Object Framework (TOF): A clustering reputation-based approach using edge computing for sharing resources among IoT smart objects
    Fortino, Giancarlo
    Fotia, Lidia
    Messina, Fabrizio
    Rosaci, Domenico
    Sarne, Giuseppe M. L.
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 96
  • [50] BCDS-SDN: Privacy and trusted data sharing using Blockchain based on a software-defined network's Edge computing architecture
    Sebbar, Anass
    Boulmalf, Mohammed
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 6578 - 6583