Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center

被引:1
|
作者
Lian, Bin [1 ]
Cui, Jialin [1 ]
Chen, Hongyuan [2 ]
Zhao, Xianghong [1 ]
Wang, Fuqun [3 ]
Chen, Kefei [3 ]
Ma, Maode [4 ]
机构
[1] NingboTech Univ, Sch Informat Sci & Engn, Ningbo 315100, Peoples R China
[2] NingBo AiSino Co Ltd, Ningbo 315048, Peoples R China
[3] Hangzhou Normal Univ, Sch Math, Hangzhou 310030, Peoples R China
[4] Nanyang Technol Univ, Sch Elect & Elect Engn, Jurong West, Singapore
基金
中国国家自然科学基金;
关键词
Authentication; Internet of Things; Data privacy; Privacy; Cryptography; Behavioral sciences; Security; Clone attack; enhanced privacy protection; location-based service (LBS); truly decentralized anonymous authentication; trusted location sharing; ANONYMOUS AUTHENTICATION; EFFICIENT REVOCATION; SYSTEM; INTERNET;
D O I
10.1109/JIOT.2023.3336337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many IoT applications require users to share their devices' location, and enhanced privacy-protection means sharing location anonymously, unlinkably and without relying on any administrators. But under such protection, it is difficult to trust shared location data, which may be from unregistered devices or from the same one's multiple logins or from the cloned device ID, even be generated by an attacker without any devices! Such untrusted location sharing cheats system, misleads users, even attacks system. To the best of our knowledge, such problems have not been solved in a decentralized system. To solve them in one scheme, we put forward the first decentralized accumulator for device registration and construct the first practical decentralized anonymous authentication for device login. When logging in, the device provides a special knowledge proof, which integrates zero-knowledge (for privacy) with knowledge-leakage (for identifying abnormal behaviors) designing for blockchain (for decentralization). Therefore, in our system, only registered IoT devices can upload location data and their logins are anonymous and unlinkable, while login exceeding ${K}$ times in a system period or cloning ID to login concurrently can be identified and tracked without any trusted centers. In addition, we provide the security proofs and the application examples of the proposed scheme. And the efficiency analysis and experimental data show that the performance of our scheme can meet the needs of real-world location sharing on IoT.
引用
收藏
页码:12331 / 12345
页数:15
相关论文
共 50 条
  • [41] Privacy-Preserving Data Analysis without Trusted Third Party
    Miyaji, Atsuko
    Takahashi, Tomoka
    Wang, Ping-Lun
    Yamatsuki, Tatsuhiro
    Mimoto, Tomoaki
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 710 - 717
  • [42] Verifiable and privacy preserving federated learning without fully trusted centers
    Gang Han
    Tiantian Zhang
    Yinghui Zhang
    Guowen Xu
    Jianfei Sun
    Jin Cao
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 : 1431 - 1441
  • [43] An efficient quantum deniable authentication protocol without a trusted center
    Shi, Wei-Min
    Zhou, Yi-Hua
    Yang, Yu-Guang
    Zhang, Xin-Lan
    Zhang, Jan-Biao
    OPTIK, 2016, 127 (16): : 6484 - 6489
  • [44] Edge Trusted Sharing: Task-Driven Decentralized Resources Collaborate in IoT
    Dai, Meiling
    Xu, Siya
    Wang, Zhili
    Ma, Huisheng
    Qiu, Xuesong
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (14) : 12077 - 12089
  • [45] Trusted reputation system for heterogeneous network resource sharing based on blockchain in IoT
    Li, Jingwen
    Dai, Meiling
    Lu, Yi
    Yang, Shaojie
    WIRELESS NETWORKS, 2025, 31 (02) : 1421 - 1433
  • [46] Verifiable and privacy preserving federated learning without fully trusted centers
    Han, Gang
    Zhang, Tiantian
    Zhang, Yinghui
    Xu, Guowen
    Sun, Jianfei
    Cao, Jin
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (03) : 1431 - 1441
  • [47] Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party
    Lazrig, Ibrahim
    Ong, Toan C.
    Ray, Indrajit
    Ray, Indrakshi
    Jiang, Xiaoqian
    Vaidya, Jaideep
    2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 75 - 84
  • [48] A NEW VERIFIABLE THRESHOLD DECRYPTION SCHEME WITHOUT TRUSTED CENTER
    Feng, Xu
    Xin, Lv
    Jia, Likun
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (05): : 551 - 558
  • [49] Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments
    Birgersson, Marcus
    Artho, Cyrille
    Balliu, Musard
    2024 IEEE SECURE DEVELOPMENT CONFERENCE, SECDEV 2024, 2024, : 105 - 116
  • [50] iTEVAC: an enhanced trusted evacuation system leveraging fog computing and IoT
    Le, Thinh Vinh
    Tran, Huan Thien
    Bouzefrane, Samia
    JOURNAL OF INFORMATION AND TELECOMMUNICATION, 2024, 8 (04) : 417 - 451