Bidirectional location privacy protection scheme for epidemiological investigation based on OT

被引:1
|
作者
Liu, Xueyan [1 ]
Wang, Jing [1 ]
Liu, Qiong [1 ]
Xiong, Xin [1 ]
Niu, Shufen [1 ]
机构
[1] Northwest Normal Univ, Comp Sci & Engn, Lanzhou 730070, Gansu, Peoples R China
基金
中国国家自然科学基金;
关键词
Epidemic prevention and control; Location privacy; The Hilbert curve; Bloom filter; Oblivious transfer; OBLIVIOUS TRANSFER; K-ANONYMITY;
D O I
10.1016/j.cose.2023.103453
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Epidemiological investigation is a crucial method to deal with epidemics (e.g., COVID-19), and the location data in the epidemiological investigation is widely used to determine close contacts. Through the analysis of the location data of the respondents and the diagnosis point data, it can effectively determine the close contacts and then promote the prevention and control of the epidemic. Due to the sensitivity of location data, the direct release and epidemiological investigation of location data will cause social panic and seriously threaten to personal privacy. Therefore, two aspects need to be considered in epidemiological investigation: the location privacy of responder and the location privacy of the diagnosis point. Focusing on the above two privacy requirements, we propose a bidirectional location privacy protection scheme based on oblivious transfer. Firstly, we introduce the Hilbert curve into Centers for Disease Control and Prevention (CDCP) to encode the position of the diagnosis point. Then the Bloom filter is used to perturb the encode of diagnosis point to ensure the location privacy of CDCP. Secondly, 1-out-of-n oblivious transfer protocol is carried on between the CDCP and the responder to achieve screening of close contacts. At the same time, the bidirectional privacy protection of the location between CDCP and respondents has been ensured. Security analysis and performance analysis prove that the overall scheme is secure, feasible, and efficient.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] A location privacy protection scheme based on random encryption period for VSNs
    Deng, Xinyang
    Xin, Xin
    Gao, Tianhan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (03) : 1351 - 1359
  • [22] An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem
    Jingjing Wang
    Yiliang Han
    Xiaoyuan Yang
    TsinghuaScienceandTechnology, 2016, 21 (03) : 260 - 269
  • [23] A location privacy protection scheme based on random encryption period for VSNs
    Xinyang Deng
    Xin Xin
    Tianhan Gao
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 1351 - 1359
  • [24] Cache-Based Privacy Protection Scheme for Continuous Location Query
    Liu, Zhenpeng
    Miao, Dewei
    Li, Ruilin
    Liu, Yi
    Li, Xiaofei
    ENTROPY, 2023, 25 (02)
  • [25] LBS user location privacy protection scheme based on trajectory similarity
    Qian, Kun
    Li, Xiaohui
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [26] Research on Location Privacy Protection Scheme Based on Similar Trajectory Replacement
    Song C.
    Zhang Y.-D.
    Peng W.-P.
    Wang L.
    Liu Z.-Z.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2020, 43 (01): : 135 - 142
  • [27] An Efficient Location Privacy Protection Scheme Based on the Chinese Remainder Theorem
    Wang, Jingjing
    Han, Yiliang
    Yang, Xiaoyuan
    TSINGHUA SCIENCE AND TECHNOLOGY, 2016, 21 (03) : 260 - 269
  • [28] Location Privacy Protection Scheme Based on Random Encryption Period in VANETs
    Gao, Tianhan
    Xin, Xin
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 366 - 374
  • [29] A Demand-Aware Location Privacy Protection Scheme in Continuous Location-based Services
    Li, Xinghua
    Deng, Lingjuan
    Gao, Sheng
    Ma, Jianfeng
    Yao, Qingsong
    2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2014, : 112 - 117
  • [30] A stochastic location privacy protection scheme for edge computing
    Tian, Yuan
    Song, Biao
    Al Rodhaan, Mznah
    Huang, Chen Rong
    Al-Dhelaan, Mohammed A.
    Al-Dhelaan, Abdullah
    Al-Nabhan, Najia
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2020, 17 (03) : 2636 - 2649