Location privacy protection method based on attribute-based privacy information retrieval

被引:0
|
作者
Du G. [1 ]
Zhang L. [1 ,2 ]
Ma C. [3 ]
Zhang G. [1 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University, Harbin
[2] College of Information and Electronic Technology, Jiamusi University, Jiamusi
[3] College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao
关键词
Attribute-based encryption algorithm; Formal proof; Index; Location-based service; Privacy information retrieval; Privacy protection; Property hiding; Secret calculation; Zero information disclosure;
D O I
10.11990/jheu.201912032
中图分类号
学科分类号
摘要
Aiming at the shortcomings of index-based privacy information retrieval strategies in location-based service privacy protection in terms of processing time and user attribute protection, this work proposes a location privacy protection method rooted in attribute-based privacy information retrieval. Based on the attribute-based encryption algorithm and the essential characteristics of location service, the proposed method can complete the query and feedback of location service with zero information disclosure through the two-party secret calculation between users and location servers. Formal security analysis and performance evaluation are conducted, and the effectiveness and availability of the proposed method are proved theoretically. Meanwhile, the superiority of the proposed method is further verified by comparative experiments on its privacy protection ability and algorithm efficiency and those of similar algorithms. Copyright ©2021 Journal of Harbin Engineering University.
引用
收藏
页码:680 / 686
页数:6
相关论文
共 18 条
  • [1] ZHANG Xuejun, GUI Xiaolin, WU Zhongdong, Privacy preservation for location-based services: a survey, Journal of software, 26, 9, pp. 2373-2395, (2015)
  • [2] ZHANG Lei, MA Chunguang, YANG Songtao, Et al., Real-time similar trajectory generation algorithm for resisting trajectory difference identification attack, Journal of Harbin Engineering University, 38, 7, pp. 1173-1178, (2017)
  • [3] ZHANG Lei, YANG Songtao, LI Jing, Et al., A particle swarm optimization clustering-based attribute generalization privacy protection scheme, Journal of circuits, systems and computers, 27, 11, (2018)
  • [4] ZHANG Lei, HE Lili, LIU Desheng, Et al., An attribute generalization mix-zone without privacy leakage, IEEE access, 7, pp. 57088-57099, (2019)
  • [5] ZHANG Lei, MA Chunguang, YANG Songtao, Et al., Probability indistinguishable: a query and location correlation attack resistance scheme, Wireless personal communications, 97, 4, pp. 6167-6187, (2017)
  • [6] ZHANG Lei, MA Chunguang, YANG Songtao, Et al., A privacy preserving method from attacks of velocity prediction in road network, Journal of Xi'an Jiaotong University, 51, 2, pp. 27-32, (2017)
  • [7] LI Zengpeng, WANG Ding, Achieving one-round password-based authenticated key exchange over lattices, IEEE transactions on services computing, 12, 8, pp. 1-14, (2019)
  • [8] YU Jinxia, YANG Chaochao, YANG Liwei, Et al., Attribute-based encryption scheme supporting tree access structure on ideal lattices, Journal of Chongqing University of Posts and Telecommunications(natural science edition), 31, pp. 113-119, (2019)
  • [9] LI Weihao, NIU Ben, CAO Jin, Et al., A personalized range-sensitive privacy-preserving scheme in LBSs, Concurrency and computation: practice and experience, 32, 5, (2020)
  • [10] KHOSHGOZARAN A, SHAHABI C, SHIRANI-MEHR H., Location privacy: going beyond K-anonymity, cloaking and anonymizers, Knowledge and information systems, 26, 3, pp. 435-465, (2011)