TEPDA: A TTP-Free, Efficient, and Privacy-Preserving Framework with Data Authenticity

被引:0
|
作者
Chen, Jiahui [1 ]
Li, Yunhui [1 ]
Gan, Wensheng [2 ]
Hu, Muchung [3 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou, Peoples R China
[2] Jinan Univ, Coll Cybersecur, Guangzhou, Peoples R China
[3] Peoples Bank China, Dept Comp Sci & Technol, Guangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Participatory Sensing; Location Privacy; K-Anonymity; Authenticity; Trusted Third Party;
D O I
10.22967/HCIS.2023.13.044
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the participants in participatory sensing, the privacy of both the user's identity and location information is of vital importance. In addition, the organizer of participatory sensing usually inspires users to participate in the sensing paradigm as much as possible, which leads to the authenticity and efficiency requirements of the participants. In this work, we have constructed a comprehensive privacy-preserving framework for the participatory sensing platform called TEPDA. Our framework employs a technique of identity-based ring signature to achieve k-anonymity and pseudo-identity for privacy protection. The identity-based ring signature is newly designed and requires no pairing operation on a bilinear map. The framework simultaneously achieves security, data authenticity, user privacy, and high efficiency without any need for a trusted third party. Then we supply security analysis which shows that TEPDA is secure under existential unforgeability against adaptive chosen-message and identity attacks (EUF-IDRS-CMIA2). Moreover, implementation and performance results show that TEPDA can let users efficiently submit ring signatures and allow participatory sensing servers to verify them in a timely manner. Finally, extensive experimental comparisons are given to show that our proposed algorithm outperforms the baseline algorithm.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] A New Anonymity Model for Privacy-Preserving Data Publishing
    Huang Xuezhen
    Liu Jiqiang
    Han Zhen
    Yang Jun
    CHINA COMMUNICATIONS, 2014, 11 (09) : 47 - 59
  • [32] A privacy-preserving data collection model for digital community
    Li HongTao
    Ma JianFeng
    Fu Shuai
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (03) : 1 - 16
  • [33] A Privacy-Preserving Framework for Mining Continuous Sequences in Trajectory Systems
    Jureczek, Pawel
    Kozierkiewicz-Hetmanska, Adrianna
    2014 EUROPEAN NETWORK INTELLIGENCE CONFERENCE (ENIC), 2014, : 52 - 58
  • [34] Privacy-Preserving Data Mining: Methods, Metrics, and Applications
    Mendes, Ricardo
    Vilela, Joao P.
    IEEE ACCESS, 2017, 5 : 10562 - 10582
  • [35] Privacy-Preserving Data Publishing: A Survey of Recent Developments
    Fung, Benjamin C. M.
    Wang, Ke
    Chen, Rui
    Yu, Philip S.
    ACM COMPUTING SURVEYS, 2010, 42 (04)
  • [36] An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme
    Ou, Lu
    Yin, Hui
    Qin, Zheng
    Xiao, Sheng
    Yang, Guangyi
    Hu, Yupeng
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [37] A survey of privacy-preserving mechanisms for heterogeneous data types
    Cunha, Mariana
    Mendes, Ricardo
    Vilela, Joao P.
    COMPUTER SCIENCE REVIEW, 2021, 41
  • [38] Efficient privacy-preserving content recommendation for online social communities
    Li, Dongsheng
    Lv, Qin
    Shang, Li
    Gu, Ning
    NEUROCOMPUTING, 2017, 219 : 440 - 454
  • [39] Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications
    Zhu, Hui
    Wang, Fengwei
    Lu, Rongxing
    Liu, Fen
    Fu, Gang
    Li, Hui
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2947 - 2957
  • [40] Dimension-aware under spatiotemporal constraints: an efficient privacy-preserving framework with peak density clustering
    Zhang, Jing
    Huang, Qihan
    Hu, Jian-Yu
    Ye, Xiu-Cai
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (04) : 4164 - 4191