APPLSS: Adaptive Privacy Preserved Location Sharing Scheme Based on Attribute-Based Encryption

被引:2
|
作者
Han, Yiliang [1 ]
Zhu, Shuaishuai [1 ]
Li, Yu [1 ]
Lin, Xi [1 ]
机构
[1] Engn Univ PAP, Engn Coll Cryptog, Xian 710086, Peoples R China
关键词
location-based service; location privacy; attribute-based encryption; K-ANONYMITY; OBFUSCATION; PROTECTION; MODEL;
D O I
10.23919/JCC.2021.03.009
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Unauthorized access to location information in location-based service is one of the most critical security threats to mobile Internet. In order to solve the problem of quality of location sharing while keeping privacy preserved, adaptive privacy preserved location sharing scheme called APPLSS is proposed, which is based on a new hierarchical ciphertext-policy attribute-based encryption algorithm. In the algorithm, attribute authority sets the attribute vector according to the attribute tags of registration from the location service providers. Then the attribute vector can be adaptively transformed into an access structure to control the encryption and decryption. The APPLSS offers a natural hierarchical mechanism in protecting location information when partially sharing it in mobile networks. It allows service providers access to end user's sensitive location more flexibly, and satisfies a sufficient-but-no-more strategy. For end-users, the quality of service is obtained while no extra location privacy is leaked. To improve service response performance, outsourced decryption is deployed to avoid the bottlenecks of the service providers and location information providers. The performance analysis and experiments show that APPLSS is an efficient and practical location sharing scheme.
引用
收藏
页码:105 / 121
页数:17
相关论文
共 50 条
  • [1] APPLSS: Adaptive Privacy Preserved Location Sharing Scheme Based on Attribute-Based Encryption
    Yiliang Han
    Shuaishuai Zhu
    Yu Li
    Xi Lin
    [J]. China Communications, 2021, 18 (03) : 105 - 121
  • [2] Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
    Feng, Tao
    Chen, Liqiu
    Fang, Junli
    Shi, Jianming
    [J]. Tongxin Xuebao/Journal on Communications, 2023, 44 (05): : 224 - 233
  • [3] A privacy-preserving data sharing system with decentralized attribute-based encryption scheme
    Kang, Li
    Zhang, Leyou
    [J]. International Journal of Network Security, 2020, 22 (05): : 815 - 827
  • [4] Location Privacy Preserving Scheme Based on Attribute Encryption
    Lin, Xi
    Han, Yiliang
    Ke, Yan
    Yang, Xiaoyuan
    [J]. SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 164 - 177
  • [5] A Data Sharing Scheme Based on Blockchain System and Attribute-Based Encryption
    Zhang, Xiaodong
    Chen, Taowei
    Feng, Yan
    Yu, Yimin
    [J]. 2021 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2021, 2021, : 195 - 202
  • [6] Power data sharing scheme based on blockchain and attribute-based encryption
    Yang, Xiaodong
    Liao, Zefan
    Liu, Lei
    Wang, Caifen
    [J]. Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2023, 51 (13): : 169 - 176
  • [7] User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption
    Sheng, Luo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] Attribute-based Encryption Scheme with Fast Encryption
    Luo, Wang-Ping
    Feng, Chao-Sheng
    Zou, Li-Ping
    Yuan, Ding
    Wu, Tang-Mei
    Li, Min
    Wang, Guang-Jie
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (12): : 3923 - 3936
  • [9] Advanced attribute-based encryption protocol based on the modified secret sharing scheme
    Kudinov, M. A.
    Chilikov, A. A.
    Kiktenko, E. O.
    Fedorov, A. K.
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (04) : 333 - 341
  • [10] Advanced attribute-based encryption protocol based on the modified secret sharing scheme
    M. A. Kudinov
    A. A. Chilikov
    E. O. Kiktenko
    A. K. Fedorov
    [J]. Journal of Computer Virology and Hacking Techniques, 2020, 16 : 333 - 341