TEPDA: A TTP-Free, Efficient, and Privacy-Preserving Framework with Data Authenticity

被引:0
|
作者
Chen, Jiahui [1 ]
Li, Yunhui [1 ]
Gan, Wensheng [2 ]
Hu, Muchung [3 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou, Peoples R China
[2] Jinan Univ, Coll Cybersecur, Guangzhou, Peoples R China
[3] Peoples Bank China, Dept Comp Sci & Technol, Guangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Participatory Sensing; Location Privacy; K-Anonymity; Authenticity; Trusted Third Party;
D O I
10.22967/HCIS.2023.13.044
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the participants in participatory sensing, the privacy of both the user's identity and location information is of vital importance. In addition, the organizer of participatory sensing usually inspires users to participate in the sensing paradigm as much as possible, which leads to the authenticity and efficiency requirements of the participants. In this work, we have constructed a comprehensive privacy-preserving framework for the participatory sensing platform called TEPDA. Our framework employs a technique of identity-based ring signature to achieve k-anonymity and pseudo-identity for privacy protection. The identity-based ring signature is newly designed and requires no pairing operation on a bilinear map. The framework simultaneously achieves security, data authenticity, user privacy, and high efficiency without any need for a trusted third party. Then we supply security analysis which shows that TEPDA is secure under existential unforgeability against adaptive chosen-message and identity attacks (EUF-IDRS-CMIA2). Moreover, implementation and performance results show that TEPDA can let users efficiently submit ring signatures and allow participatory sensing servers to verify them in a timely manner. Finally, extensive experimental comparisons are given to show that our proposed algorithm outperforms the baseline algorithm.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] A Privacy-Preserving Framework for Location-Based Service: A Review of Structural Design and Analysis
    Teerakanok, Songpon
    Pattaranantakul, Montida
    Vorakulpipat, Chalee
    Kamolphiwong, Sinchai
    Siwamogsatham, Siwaruk
    IETE TECHNICAL REVIEW, 2014, 31 (06) : 422 - 439
  • [42] Encryption-Free Framework of Privacy-Preserving Image Recognition for Photo-Based Information Services
    Nakamura, Kazuaki
    Nitta, Naoko
    Babaguchi, Noboru
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (05) : 1264 - 1279
  • [43] Privacy-Preserving Trust-Aware Group-Based Framework in Mobile Crowdsensing
    Alamri, Bayan Hashr Saeed
    Monowar, Muhammad Mostafa
    Alshehri, Suhair
    IEEE ACCESS, 2022, 10 : 134770 - 134784
  • [44] Data Value Estimation for Privacy-Preserving Big/Personal Data Businesses
    Kiyomoto, Shinsaku
    APPLICATIONS + PRACTICAL CONCEPTUALIZATION + MATHEMATICS = FRUITFUL INNOVATION, 2016, 11 : 149 - 158
  • [45] A unified framework for privacy preserving data clustering
    Li, Wenye
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8834 : 319 - 326
  • [46] A Unified Framework for Privacy Preserving Data Clustering
    Li, Wenye
    NEURAL INFORMATION PROCESSING (ICONIP 2014), PT I, 2014, 8834 : 319 - 326
  • [47] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain
    Wang, Hui
    Huang, Haiping
    Qin, Yuxiang
    Wang, Yunqi
    Wu, Min
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2017, 6 (06)
  • [48] PPTPF: Privacy-Preserving Trajectory Publication Framework for CDR Mobile Trajectories
    Yang, Jianxi
    Dash, Manoranjan
    Teo, Sin G.
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2021, 10 (04)
  • [49] Background knowledge attacks in privacy-preserving data publishing models
    Desai, Nidhi
    Das, Manik Lal
    Chaudhari, Payal
    Kumar, Naveen
    COMPUTERS & SECURITY, 2022, 122
  • [50] Toward Scalable Anonymization for Privacy-Preserving Big Data Publishing
    Mehta, Brijesh B.
    Rao, Udai Pratap
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 2, 2018, 708 : 297 - 304