Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center

被引:1
|
作者
Lian, Bin [1 ]
Cui, Jialin [1 ]
Chen, Hongyuan [2 ]
Zhao, Xianghong [1 ]
Wang, Fuqun [3 ]
Chen, Kefei [3 ]
Ma, Maode [4 ]
机构
[1] NingboTech Univ, Sch Informat Sci & Engn, Ningbo 315100, Peoples R China
[2] NingBo AiSino Co Ltd, Ningbo 315048, Peoples R China
[3] Hangzhou Normal Univ, Sch Math, Hangzhou 310030, Peoples R China
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Jurong West, Singapore
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things; Data privacy; Privacy; Cryptography; Behavioral sciences; Security; Clone attack; enhanced privacy protection; location-based service (LBS); truly decentralized anonymous authentication; trusted location sharing; ANONYMOUS AUTHENTICATION; EFFICIENT REVOCATION; SYSTEM; INTERNET;
D O I
10.1109/JIOT.2023.3336337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many IoT applications require users to share their devices' location, and enhanced privacy-protection means sharing location anonymously, unlinkably and without relying on any administrators. But under such protection, it is difficult to trust shared location data, which may be from unregistered devices or from the same one's multiple logins or from the cloned device ID, even be generated by an attacker without any devices! Such untrusted location sharing cheats system, misleads users, even attacks system. To the best of our knowledge, such problems have not been solved in a decentralized system. To solve them in one scheme, we put forward the first decentralized accumulator for device registration and construct the first practical decentralized anonymous authentication for device login. When logging in, the device provides a special knowledge proof, which integrates zero-knowledge (for privacy) with knowledge-leakage (for identifying abnormal behaviors) designing for blockchain (for decentralization). Therefore, in our system, only registered IoT devices can upload location data and their logins are anonymous and unlinkable, while login exceeding ${K}$ times in a system period or cloning ID to login concurrently can be identified and tracked without any trusted centers. In addition, we provide the security proofs and the application examples of the proposed scheme. And the efficiency analysis and experimental data show that the performance of our scheme can meet the needs of real-world location sharing on IoT.
引用
收藏
页码:12331 / 12345
页数:15
相关论文
共 50 条
  • [1] Location Privacy Protection Scheme Without Trusted Third Party
    Zhang, Mingyue
    Jin, Tong
    Wang, Guohong
    Wang, Tian
    Zhang, Gongxuan
    IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SYSTEMS SCIENCE AND ENGINEERING (IEEE RASSE 2021), 2021,
  • [2] Blockchain-Driven Trusted Data Sharing With Privacy Protection in IoT Sensor Network
    Ma, Zhaofeng
    Wang, Lingyun
    Zhao, Weizhe
    IEEE SENSORS JOURNAL, 2021, 21 (22) : 25472 - 25479
  • [3] Position Sharing for Location Privacy in Non-trusted Systems
    Duerr, Frank
    Skvortsov, Pavel
    Rothermel, Kurt
    2011 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2011), 2011, : 189 - 196
  • [4] Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing
    Loehr, Hans
    Sadeghi, Ahmad-Reza
    Vishik, Claire
    Winandy, Marcel
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 396 - +
  • [5] Quantum protection scheme for privacy data based on trusted center
    Wen, Xiaojun
    Chen, Yongzhi
    Zhang, Wei
    Zoe, L. Jiang
    Fang, Junbin
    OPTICS AND LASER TECHNOLOGY, 2024, 169
  • [6] Secret sharing-multisignature scheme without a trusted center
    Lu, Ming-Xin
    Fu, Xiao-Tong
    Zhang, Ning
    Xiao, Guo-Zhen
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2007, 35 (01): : 99 - 101
  • [7] Blockchain-based trusted data sharing among trusted stakeholders in IoT
    Shi, Peichang
    Wang, Huaimin
    Yang, Shangzhi
    Chen, Chang
    Yang, Wentao
    SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (10): : 2051 - 2064
  • [8] Privacy-preserving raw data collection without a trusted authority for IoT
    Liu, Yi-Ning
    Wang, Yan-Ping
    Wang, Xiao-Fen
    Xia, Zhe
    Xu, Jing-Fang
    COMPUTER NETWORKS, 2019, 148 : 340 - 348
  • [9] A TRUSTED INFORMATION SHARING SKELETON FOR PRIVACY PRESERVATION
    Li, Chao
    Xu, Zhen
    Zhang, Zichun
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1372 - 1376
  • [10] Privacy Enhanced Trusted Network Connect
    Bente, Ingo
    Vieweg, Joerg
    von Helden, Josef
    TRUSTED SYSTEMS, 2010, 6163 : 129 - 145