Preserving Secrecy in Mobile Social Networks

被引:2
作者
Suntaxi, Gabriela [1 ]
El Ghazi, Aboubakr Achraf [1 ]
Boehm, Klemens [1 ]
机构
[1] Karlsruhe Inst Technol, Fasanengarten 5, D-76131 Karlsruhe, Germany
关键词
Mobile social networks; access control; location-based services; PRIVACY; EFFICIENT; SECURE;
D O I
10.1145/3396071
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Location-based services are one of the most important services offered by mobile social networks. Offering this kind of service requires accessing the physical position of users together with the access authorizations, i.e., who is authorized to access what information. However, these physical positions and authorizations are sensitive information that have to be kept secret from any adversary, including the service providers. As far as we know, the problem of offering location-based services in mobile social networks with a revocation feature under collusion assumption, i.e., an adversary colludes with the service provider, has not been studied. In this article, we show how to solve this problem in the example of range queries. Specifically, we guarantee any adversary, including the service provider, is not able to learn (1) the physical position of the users, (2) the distance between his position and that of the users, and (3) whether two users are allowed to learn the distance between them. We propose two approaches, namely, two-layer symmetric encryption and two-layer attribute-based encryption. The main difference between them is that they use, among other encryption schemes, symmetric and attribute-based encryption, respectively. Next, we prove the secrecy guarantees of both approaches, analyze their complexity, and provide experiments to evaluate their performance in practice.
引用
收藏
页数:29
相关论文
共 57 条
[1]  
Al Ridhawi I., 2009, P GLOB INF INFR S, P1
[2]   Social Behaviometrics for Personalized Devices in the Internet of Things Era [J].
Anjomshoa, Fazel ;
Aloqaily, Moayad ;
Kantarci, Burak ;
Erol-Kantarci, Melike ;
Schuckers, Stephanie .
IEEE ACCESS, 2017, 5 :12199-12213
[3]  
[Anonymous], 2004, TECHNICAL REPORT
[4]  
[Anonymous], 2014, J INTERNET SERV INF, DOI DOI 10.1142/S2010135X14500258
[5]  
[Anonymous], 2018, THE GUARDIAN
[6]   Efficient security policy enforcement for the mobile environment [J].
Atluri, Vijayalakshmi ;
Shin, Heechang ;
Vaidya, Jaideep .
JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) :439-475
[7]  
Balasubramanian V, 2018, 2018 IEEE 4TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P13, DOI 10.1109/WF-IoT.2018.8355198
[8]   Mix zones: User privacy in location-aware services [J].
Beresford, AR ;
Stajano, F .
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, :127-131
[9]  
Bertino Elisa, 2005, P 10 ACM S ACCESS CO, P9
[10]  
Bethencourt John, 2007, P IEEE SEC PRIV C