Privacy-preserving framework for geosocial applications

被引:2
作者
Malina, Lukas [1 ]
Hajny, Jan [1 ]
机构
[1] Brno Univ Technol, Dept Telecommun, CS-61090 Brno, Czech Republic
关键词
security; geosocial services; cryptography; pseudonymity; authenticity; MODEL;
D O I
10.1002/sec.873
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper deals with user privacy in geosocial applications. Geosocial applications have become very popular but can misuse user's private data and location. We propose a novel solution that prevents tracking and protects against personal identity and location being misused by external attackers or service providers. The proposed framework provides security and privacy protection for geosocial applications that provide, for example, information sharing, geotagging, and monitoring of people without revealing their identity to unauthorized persons, including the service provider. Unlike current security solutions in geosocial services, our novel framework uses advanced cryptography to secure user privacy. This protection is provided by advanced group signatures ensuring data integrity, authenticity, non-repudiation, and strong privacy protection. The paper outputs a detailed cryptographic scheme for the protection of privacy in geosocial services and its security analysis. The proposed scheme has also been implemented, and the performance results are outlined in the paper. Copyright (c) 2013 John Wiley & Sons, Ltd.
引用
收藏
页码:1764 / 1779
页数:16
相关论文
共 27 条
[1]  
[Anonymous], IEEE 1 AESS EUR C SA
[2]   Mix zones: User privacy in location-aware services [J].
Beresford, AR ;
Stajano, F .
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, :127-131
[3]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[4]  
Carbunar Bogdan, 2012, Applied Cryptography and Network Security. Proceedings 10th International Conference, ACNS 2012, P436, DOI 10.1007/978-3-642-31284-7_26
[5]  
Costantino G., 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust (PST), P9, DOI 10.1109/PST.2012.6297914
[6]  
Doty Nick, 2010, CORR
[7]  
Ferraral AL, 2009, LECT NOTES COMPUT SC, V5473, P309, DOI 10.1007/978-3-642-00862-7_21
[8]  
Glassman C.C.N.R., 2010, J ELECT RESOURCES ME, V7, P336
[9]  
Jensen CS, 2009, LECT NOTES COMPUT SC, V5599, P31, DOI 10.1007/978-3-642-03511-1_2
[10]   The Elliptic Curve Digital Signature Algorithm (ECDSA) [J].
Don Johnson ;
Alfred Menezes ;
Scott Vanstone .
International Journal of Information Security, 2001, 1 (1) :36-63