Location Privacy Preserving Scheme Based on Attribute Encryption

被引:0
|
作者
Lin, Xi [1 ]
Han, Yiliang [1 ]
Ke, Yan [1 ]
Yang, Xiaoyuan [1 ]
机构
[1] Engn Univ Chinese Armed Police Force, Dept Elect Technol, Xian 710086, Peoples R China
关键词
Social network; Location; Privacy protection; Ranks of intimacy; Attribute-based encryption;
D O I
10.1007/978-3-319-49148-6_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are only two modes,"public" or "private" to manage the user's location information in the social network. However, in some cases, users need to inform some people of their exact location, and the other people are only access to the inaccurate, maybe fuzzy location information. Therefore, we design a location privacy preserving scheme based on attribute encryption, which provides "precise", "more accurate", "fuzzy" and "private" four modes to manage the location information. The scheme based on the algorithm of WT-CP-ABE [1]. The location information is divided into three parts according to different ranks of intimacy, then we encrypt the key information and position information with attribute-based encryption and symmetric encryption respectively, and then issue the ciphertext to the social network. We analyze the security of the scheme, which shows that the scheme has the advantages of user attribute information confidentiality, data confidentiality and it can resist the collusion attack.
引用
收藏
页码:164 / 177
页数:14
相关论文
共 50 条
  • [31] User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Rahulamathavan, Yogachandran
    Veluru, Suresh
    Han, Jinguang
    Li, Fei
    Rajarajan, Muttukrishnan
    Lu, Rongxing
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (09) : 2939 - 2946
  • [32] A Privacy-Preserving Attribute-Based Access Control Scheme
    Xu, Yang
    Zeng, Quanrun
    Wang, Guojun
    Zhang, Cheng
    Ren, Ju
    Zhang, Yaoxue
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 : 361 - 370
  • [33] A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM
    Kane, Seyni
    Bkakria, Anis
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVIII, DBSEC 2024, 2024, 14901 : 101 - 108
  • [34] Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption
    Zhou, Zhibin
    Huang, Dijiang
    Wang, Zhijie
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (01) : 126 - 138
  • [35] A bidirectional reversible and multilevel location privacy protection method based on attribute encryption
    Hu, Zhaowei
    Hu, Kaiyi
    Hasan, Milu Md Khaled
    PLOS ONE, 2024, 19 (09):
  • [36] Privacy Preserving Scheme for Location and Content Protection in Location-Based Services
    Peng, Tao
    Liu, Qin
    Wang, Guojun
    Xiang, Yang
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 26 - 38
  • [37] UBLS: User-Based Location Selection Scheme for Preserving Location Privacy
    Alotaibi, Muneera
    Ibrahem, Mohamed I.
    Alasmary, Waleed
    Al-Abri, Dawood
    Mahmoud, Mohamed
    2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [38] Privacy-preserving Blockchain based IoT Ecosystem using Attribute-based Encryption
    Rahulamathavan, Yogachandran
    Phan, Raphael C-W
    Rajarajan, Muttukrishnan
    Misra, Sudip
    Kondoz, Ahmet
    2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2017,
  • [39] User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption
    Sheng, Luo
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [40] Privacy Preseving Attribute Based Searchable Encryption Scheme in Intelligent Transportation System
    Niu, Shufen
    Ge, Peng
    Dong, Runyuan
    Liu, Qi
    Liu, Wei
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (07): : 3036 - 3045