A Location Privacy-Preserving Protocol Based on Homomorphic Encryption and Key Agreement

被引:5
作者
Zhu, Xiaoling [1 ]
Lu, Yang [1 ]
Zhu, Xiaojuan [1 ]
Qiu, Shuwei [1 ]
机构
[1] Hefei Univ Technol, Sch Comp & Informat, Hefei 230000, Peoples R China
来源
PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C) | 2014年
基金
中国国家自然科学基金;
关键词
location-based services; location privacy; k-anonymity; homomorphic encryption; key agreement; K-ANONYMITY;
D O I
10.1109/ISCC-C.2013.17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location-based services (LBS) bring so much convenience to our daily life. However they have incurred serious location privacy problems. k-anonymity is the one of most popular privacy-preserving methods. The method relying on a trusted third party (TTP) might cause the TTP to become a performance bottleneck. So TTP-free protocols are proposed. But existing TTP-free protocols cannot resist attacks from multiple users colluding with a LBS provider. To solve the problems, this paper proposes a novel location privacy-preserving protocol. The protocol uses key agreement to construct the perturbations which can be removed on the whole. The perturbations are used to disguise real locations; meanwhile, they do not affect LBS service quality. With the help of homomorphic encryption, the LBS provider can compute the centroid of a companion set while it does not know the locations of the members in the set. The analysis shows that the protocol can resist location privacy attacks from insiders and outsiders, especially from multiple users colluding with the LBS provider. The protocol achieves high service quality while providing strong location privacy protection for LBS.
引用
收藏
页码:54 / 59
页数:6
相关论文
共 14 条
[1]  
[Anonymous], 1978, FDN SEC COMPUT
[2]   GLP: A cryptographic approach for group location privacy [J].
Ashouri-Talouki, Maede ;
Baraani-Dastjerdi, Ahmad ;
Selcuk, Ali Aydin .
COMPUTER COMMUNICATIONS, 2012, 35 (12) :1527-1533
[3]   Threshold Anonymous Announcement in VANETs [J].
Chen, Liqun ;
Ng, Siaw-Lynn ;
Wang, Guilin .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) :605-615
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]   Protecting location privacy with personalized k-anonymity:: Architecture and algorithms [J].
Gedik, Bugra ;
Liu, Ling .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (01) :1-18
[6]   Anonymous usage of location-based services through spatial and temporal cloaking [J].
Gruteser, M ;
Grunwald, D .
PROCEEDINGS OF MOBISYS 2003, 2003, :31-42
[7]   "Don't trust anyone": Privacy protection for location-based services [J].
Hashem, Tanzima ;
Kulik, Lars .
PERVASIVE AND MOBILE COMPUTING, 2011, 7 (01) :44-59
[8]  
Huang Yi, 2011, Chinese Journal of Computers, V34, P1976, DOI 10.3724/SP.J.1016.2011.01976
[9]  
National bureau of statistics, 2013, URB POP DENS
[10]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223