Location Privacy Preserving Scheme Based on Attribute Encryption

被引:0
|
作者
Lin, Xi [1 ]
Han, Yiliang [1 ]
Ke, Yan [1 ]
Yang, Xiaoyuan [1 ]
机构
[1] Engn Univ Chinese Armed Police Force, Dept Elect Technol, Xian 710086, Peoples R China
关键词
Social network; Location; Privacy protection; Ranks of intimacy; Attribute-based encryption;
D O I
10.1007/978-3-319-49148-6_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are only two modes,"public" or "private" to manage the user's location information in the social network. However, in some cases, users need to inform some people of their exact location, and the other people are only access to the inaccurate, maybe fuzzy location information. Therefore, we design a location privacy preserving scheme based on attribute encryption, which provides "precise", "more accurate", "fuzzy" and "private" four modes to manage the location information. The scheme based on the algorithm of WT-CP-ABE [1]. The location information is divided into three parts according to different ranks of intimacy, then we encrypt the key information and position information with attribute-based encryption and symmetric encryption respectively, and then issue the ciphertext to the social network. We analyze the security of the scheme, which shows that the scheme has the advantages of user attribute information confidentiality, data confidentiality and it can resist the collusion attack.
引用
收藏
页码:164 / 177
页数:14
相关论文
共 50 条
  • [41] Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures
    Zhang, Liangxuan
    Li, Hui
    Zhang, Yinghui
    Khan, Fawad
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 475 - 482
  • [42] Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing
    Yogesh Deshmukh J.
    Yadav S.K.
    Bhandari G.M.
    Materials Today: Proceedings, 2023, 80 : 1786 - 1791
  • [43] Privacy preserving spatio-temporal attribute-based encryption for cloud applications
    Routray, Kasturi
    Bera, Padmalochan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2025, 28 (01):
  • [44] Privacy-preserving attribute-based access control using homomorphic encryption
    Kerl, Malte
    Bodin, Ulf
    Schelen, Olov
    CYBERSECURITY, 2025, 8 (01):
  • [45] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2150 - 2162
  • [46] A location privacy protection scheme based on random encryption period for VSNs
    Deng, Xinyang
    Xin, Xin
    Gao, Tianhan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (03) : 1351 - 1359
  • [47] A location privacy protection scheme based on random encryption period for VSNs
    Xinyang Deng
    Xin Xin
    Tianhan Gao
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 1351 - 1359
  • [48] A privacy-preserving parallel and homomorphic encryption scheme
    Min, Zhaoe
    Yang, Geng
    Shi, Jingqi
    OPEN PHYSICS, 2017, 15 (01): : 135 - 142
  • [49] Location Privacy Protection Scheme Based on Random Encryption Period in VANETs
    Gao, Tianhan
    Xin, Xin
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 366 - 374
  • [50] Geometric Searchable Encryption for Privacy-Preserving Location-Based Services
    Chen, Zhenhua
    Nie, Jingjing
    Li, Zhanli
    Susilo, Willy
    Ge, Chunpeng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2672 - 2684