Attribute generalization mix-zone based on multiple secure computation

被引:0
|
作者
Wang B. [1 ,2 ]
Zhang L. [2 ]
Zhang G. [1 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University, Harbin
[2] College of Information and Electronic Technology, Jiamusi University, Jiamusi
来源
关键词
Attribute generalization; Homomorphic encryption; Privacy protection; Road network; Secure computation;
D O I
10.11959/j.issn.1000-436x.2019077
中图分类号
学科分类号
摘要
In order to cope with the problems of resist the attack of user tracking with attributes and resist the disguised attack in road networks, based on the conception of attribute generalization and the methods of homomorphic encryption, a privacy protection method to complete the calculation of attribute generalization in private state and achieve attribute generalization was proposed. The proposed method utilized the homomorphic encryption to achieve secret bidding selection with an agent, and then utilize secure multi-party computation to calculate the similar attributes and achieve the attribute generalization in the end. With the help of fully attribute generalization, this method can solve the problem of users can be tracked by the potential attributes, and at the same time the privacy calculation also does not reveal any information to participants, so this method can prevent the disguised attacker that obtains user’s information in mix-zone. At last, in order to demonstrate the superiority of the proposed method in both of academically and practicality, the security analysis and experimental verification are given, and the procedure of formulation verification and the result of experiment further substantiate the superiorities of the proposed method. © 2019, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:83 / 94
页数:11
相关论文
共 26 条
  • [1] Gruteser M., Grunwald D., Anonymous usage of location-based services through spatial and temporal cloaking, International Conference on Mobile Systems, Applications and Services, pp. 31-42, (2003)
  • [2] Gedik B., Ling L., Location privacy in mobile systems: a personalized anonymization model, International Conference on Distributed Computing Systems, pp. 620-629, (2005)
  • [3] Bamba B., Liu L., Pesti P., Et al., Supporting anonymous location queries in mobile environments with privacygrid, International Conference on World Wide Web, pp. 237-246, (2008)
  • [4] Fuyu L., Hua K.A., Ying C., Query l-diversity in location-based services, International Conference on Mobile Data Management: Systems, Services and Middleware, pp. 436-442, (2009)
  • [5] Niu B., Zhu X.Y., Li Q.H., Et al., A novel attack to spatial cloaking schemes in location-based services, Future Generation Computer Systems-the International Journal of Grid Computing and Escience, 49, 2015, pp. 125-132, (2015)
  • [6] Fei F., Li S., Dai H., Et al., A K-anonymity based schema for location privacy preservation, PP, 99, (2017)
  • [7] Sun Y.M., Chen M., Hu L., Et al., ASA: against statistical attacks for privacy-aware users in Location Based Service, Future Generation Computer Systems-the International Journal of Escience, 70, pp. 48-58, (2017)
  • [8] Ye A.Y., Li Y., Xu L., A novel location privacy-preserving scheme based on l-queries for continuous LBS, Computer Communications, 2017, 98, pp. 1-10, (2017)
  • [9] Peng T., Liu Q., Meng D.C., Et al., Collaborative trajectory privacy preserving scheme in location-based services, Information Sciences, 387, pp. 165-179, (2017)
  • [10] Wang Y., Xia Y., Hou J., Et al., A fast privacy-preserving framework for continuous location-based queries in road networks, Journal of Network and Computer Applications, 53, 2015, pp. 57-73, (2015)