Location Privacy Preserving Scheme Based on Attribute Encryption

被引:0
|
作者
Lin, Xi [1 ]
Han, Yiliang [1 ]
Ke, Yan [1 ]
Yang, Xiaoyuan [1 ]
机构
[1] Engn Univ Chinese Armed Police Force, Dept Elect Technol, Xian 710086, Peoples R China
关键词
Social network; Location; Privacy protection; Ranks of intimacy; Attribute-based encryption;
D O I
10.1007/978-3-319-49148-6_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are only two modes,"public" or "private" to manage the user's location information in the social network. However, in some cases, users need to inform some people of their exact location, and the other people are only access to the inaccurate, maybe fuzzy location information. Therefore, we design a location privacy preserving scheme based on attribute encryption, which provides "precise", "more accurate", "fuzzy" and "private" four modes to manage the location information. The scheme based on the algorithm of WT-CP-ABE [1]. The location information is divided into three parts according to different ranks of intimacy, then we encrypt the key information and position information with attribute-based encryption and symmetric encryption respectively, and then issue the ciphertext to the social network. We analyze the security of the scheme, which shows that the scheme has the advantages of user attribute information confidentiality, data confidentiality and it can resist the collusion attack.
引用
收藏
页码:164 / 177
页数:14
相关论文
共 50 条
  • [1] A privacy preserving attribute-based encryption scheme with user revocation
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (10): : 2281 - 2292
  • [2] Privacy Preserving Ciphertext Policy Attribute based Encryption Scheme with Efficient and Constant Ciphertextsize
    Tamizharasi, G. S.
    Balamurugan, B.
    Gaffar, Abdul H.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 966 - 970
  • [3] An efficient blockchain-based privacy-preserving scheme with attribute and homomorphic encryption
    Xu, Guangxia
    Zhang, Jiajun
    Cliff, Uchani Gutierrez Omar
    Ma, Chuang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10715 - 10750
  • [4] Privacy Preserving Ciphertext Policy Attribute Based Encryption
    Balu, A.
    Kuppusamy, K.
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 402 - 409
  • [5] APPLSS: Adaptive Privacy Preserved Location Sharing Scheme Based on Attribute-Based Encryption
    Yiliang Han
    Shuaishuai Zhu
    Yu Li
    Xi Lin
    中国通信, 2021, 18 (03) : 105 - 121
  • [6] APPLSS: Adaptive Privacy Preserved Location Sharing Scheme Based on Attribute-Based Encryption
    Han, Yiliang
    Zhu, Shuaishuai
    Li, Yu
    Lin, Xi
    CHINA COMMUNICATIONS, 2021, 18 (03) : 105 - 121
  • [7] A privacy-preserving data sharing system with decentralized attribute-based encryption scheme
    Kang, Li
    Zhang, Leyou
    International Journal of Network Security, 2020, 22 (05) : 815 - 827
  • [8] A Privacy-Preserving Friend Matching Scheme Based on Attribute Encryption in Mobile Social Networks
    Yu, Li
    Nan, Xingxing
    Niu, Shufen
    ELECTRONICS, 2024, 13 (11)
  • [9] An Efficient Attribute Encryption Scheme with Privacy-Preserving Policy in Smart Grid
    Cheng, Jing
    Wen, Mi
    International Journal of Network Security, 2023, 25 (01): : 140 - 150
  • [10] APS: Attribute-aware privacy-preserving scheme in location-based services
    Li, Weihao
    Li, Chen
    Geng, Yeli
    INFORMATION SCIENCES, 2020, 527 : 460 - 476