Secure Sharing of Private Locations through Homomorphic Bloom Filters

被引:0
|
作者
Feng, Yunhe [1 ]
Lu, Zheng [1 ]
Cao, Qing [1 ]
机构
[1] Univ Tennessee, Knoxville, TN 37996 USA
关键词
Location sharing; Bloom filter; Homomorphic encryption; Location security; Location privacy; ENCRYPTION;
D O I
10.1109/BDS/HPSC/IDS18.2018.00034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location information is becoming increasingly popular in online social networks, vehicle networks, and online games. In this paper, we develop a distributed protocol that allows one party to determine, in a private and secure manner, whether or not the trajectory of a second party has an intersection with specific locations of interest. Our design is fully flexible, meaning that each user is able to specify what kind of datasets they would like to make visible, and be queried by other users. The methodology is based on developing a generalized set membership check approach, using an advanced data structure called the bloom filter. To demonstrate its feasibility and usability, we offer three working prototypes, which are implemented on the open-source homomorphic libraries. Our preliminary results illustrate the performance and overhead of the proposed approaches as well as the security of the protocol designs.
引用
收藏
页码:107 / 113
页数:7
相关论文
共 50 条
  • [1] Solving Set Relations with Secure Bloom Filters Keeping Cardinality Private
    Tajan, Louis
    Westhoff, Dirk
    Armknecht, Frederik
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 443 - 450
  • [2] Cryptographically Secure Bloom-Filters
    Nojima, Ryo
    Kadobayashi, Youki
    [J]. TRANSACTIONS ON DATA PRIVACY, 2009, 2 (02) : 131 - 139
  • [3] Private Membership Test for Bloom Filters
    Meskanen, Tommi
    Liu, Jian
    Ramezanian, Sara
    Niemi, Valtteri
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 515 - 522
  • [4] Composite Bloom Filters for Secure Record Linkage
    Durham, Elizabeth A.
    Kantarcioglu, Murat
    Xue, Yuan
    Toth, Csaba
    Kuzu, Mehmet
    Malin, Bradley
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (12) : 2956 - 2968
  • [5] Secure Sharing of Partially Homomorphic Encrypted IoT Data
    Shafagh, Hossein
    Hithnawi, Anwar
    Burkhalter, Lukas
    Fischli, Pascal
    Duquennoy, Simon
    [J]. PROCEEDINGS OF THE 15TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS (SENSYS'17), 2017,
  • [6] Secure Function Evaluation based on Secret Sharing and Homomorphic Encryption
    Rane, Shantanu
    Sun, Wei
    Vetro, Anthony
    [J]. 2009 47TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1 AND 2, 2009, : 827 - 834
  • [7] Secure and private control using semi-homomorphic encryption
    Farokhi, Farhad
    Shames, Iman
    Batterham, Nathan
    [J]. CONTROL ENGINEERING PRACTICE, 2017, 67 : 13 - 20
  • [8] Private routing and ride-sharing using homomorphic encryption
    Farokhi, Farhad
    Shames, Iman
    Johansson, Karl H.
    [J]. IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (04) : 311 - 320
  • [9] Private genome analysis through homomorphic encryption
    Miran Kim
    Kristin Lauter
    [J]. BMC Medical Informatics and Decision Making, 15
  • [10] Private genome analysis through homomorphic encryption
    Kim, Miran
    Lauter, Kristin
    [J]. BMC MEDICAL INFORMATICS AND DECISION MAKING, 2015, 15