Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center

被引:1
|
作者
Lian, Bin [1 ]
Cui, Jialin [1 ]
Chen, Hongyuan [2 ]
Zhao, Xianghong [1 ]
Wang, Fuqun [3 ]
Chen, Kefei [3 ]
Ma, Maode [4 ]
机构
[1] NingboTech Univ, Sch Informat Sci & Engn, Ningbo 315100, Peoples R China
[2] NingBo AiSino Co Ltd, Ningbo 315048, Peoples R China
[3] Hangzhou Normal Univ, Sch Math, Hangzhou 310030, Peoples R China
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Jurong West, Singapore
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things; Data privacy; Privacy; Cryptography; Behavioral sciences; Security; Clone attack; enhanced privacy protection; location-based service (LBS); truly decentralized anonymous authentication; trusted location sharing; ANONYMOUS AUTHENTICATION; EFFICIENT REVOCATION; SYSTEM; INTERNET;
D O I
10.1109/JIOT.2023.3336337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many IoT applications require users to share their devices' location, and enhanced privacy-protection means sharing location anonymously, unlinkably and without relying on any administrators. But under such protection, it is difficult to trust shared location data, which may be from unregistered devices or from the same one's multiple logins or from the cloned device ID, even be generated by an attacker without any devices! Such untrusted location sharing cheats system, misleads users, even attacks system. To the best of our knowledge, such problems have not been solved in a decentralized system. To solve them in one scheme, we put forward the first decentralized accumulator for device registration and construct the first practical decentralized anonymous authentication for device login. When logging in, the device provides a special knowledge proof, which integrates zero-knowledge (for privacy) with knowledge-leakage (for identifying abnormal behaviors) designing for blockchain (for decentralization). Therefore, in our system, only registered IoT devices can upload location data and their logins are anonymous and unlinkable, while login exceeding ${K}$ times in a system period or cloning ID to login concurrently can be identified and tracked without any trusted centers. In addition, we provide the security proofs and the application examples of the proposed scheme. And the efficiency analysis and experimental data show that the performance of our scheme can meet the needs of real-world location sharing on IoT.
引用
收藏
页码:12331 / 12345
页数:15
相关论文
共 50 条
  • [21] Trusted Computing and Privacy Protection Method for Computer IoT Nodes Based on Fuzzy Logic Blockchain
    Zhong, Beixin
    Yang, Zilong
    Liu, Zhonghao
    Chen, Xiaoyong
    Cheng, Shi
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [22] ScreenConcealer: Privacy-protection System with Obfuscations for Screen Sharing
    Ishida, Mizuki
    Ikematsu, Kaori
    Igarashi, Yuki
    PROCEEDINGS OF THE 37TH ANNUAL ACM SYMPOSIUM ON USER INTERFACE SOFTWARE AND TECHNOLOGY, UIST ADJUNCT 2024, 2024,
  • [23] A Framework for User Privacy Protection Using Trusted Programs
    Takahashi, Kenichi
    Liu, Zhaoyu
    Sakurai, Kouichi
    Amamiya, Makoto
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (02): : 59 - 70
  • [24] A vehicular ad hoc network privacy protection scheme without a trusted third party
    Wang, Xiaoliang
    Li, Shuifan
    Zhao, Shujing
    Xia, Zhihua
    Bai, Liang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (12):
  • [25] Location Privacy Protection Method based on a Proxy in Un-trusted Mobile Social Networks
    Ying, Bidi
    Nayak, Amiya
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 295 - 300
  • [26] PShare: Ensuring location privacy in non-trusted systems through multi-secret sharing
    Wernke, Marius
    Duerr, Frank
    Rothermel, Kurt
    PERVASIVE AND MOBILE COMPUTING, 2013, 9 (03) : 339 - 352
  • [27] Efficient quantum secret sharing without a trusted player
    Kartick Sutradhar
    Hari Om
    Quantum Information Processing, 2020, 19
  • [28] Efficient quantum secret sharing without a trusted player
    Sutradhar, Kartick
    Om, Hari
    QUANTUM INFORMATION PROCESSING, 2020, 19 (02)
  • [29] Enhanced Protection of Ecommerce Users' Personal Data and Privacy using the Trusted Third Party Model
    Kangwa, Mukuka
    Lubobya, Charles S.
    Phiri, Jackson
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON E-BUSINESS (ICE-B), 2021, : 116 - 126
  • [30] Software Trusted Startup and Update Protection Scheme of IoT Devices
    Zhang, Mengqiao
    Zhang, Yingpeng
    Li, Shizhong
    Wan, Qinjun
    2023 IEEE 9TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD, BIGDATASECURITY, IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, HPSC AND IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY, IDS, 2023, : 147 - 152