Attribute generalization mix-zone based on multiple secure computation

被引:0
|
作者
Wang B. [1 ,2 ]
Zhang L. [2 ]
Zhang G. [1 ]
机构
[1] College of Computer Science and Technology, Harbin Engineering University, Harbin
[2] College of Information and Electronic Technology, Jiamusi University, Jiamusi
来源
关键词
Attribute generalization; Homomorphic encryption; Privacy protection; Road network; Secure computation;
D O I
10.11959/j.issn.1000-436x.2019077
中图分类号
学科分类号
摘要
In order to cope with the problems of resist the attack of user tracking with attributes and resist the disguised attack in road networks, based on the conception of attribute generalization and the methods of homomorphic encryption, a privacy protection method to complete the calculation of attribute generalization in private state and achieve attribute generalization was proposed. The proposed method utilized the homomorphic encryption to achieve secret bidding selection with an agent, and then utilize secure multi-party computation to calculate the similar attributes and achieve the attribute generalization in the end. With the help of fully attribute generalization, this method can solve the problem of users can be tracked by the potential attributes, and at the same time the privacy calculation also does not reveal any information to participants, so this method can prevent the disguised attacker that obtains user’s information in mix-zone. At last, in order to demonstrate the superiority of the proposed method in both of academically and practicality, the security analysis and experimental verification are given, and the procedure of formulation verification and the result of experiment further substantiate the superiorities of the proposed method. © 2019, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:83 / 94
页数:11
相关论文
共 26 条
  • [21] Zhang L., Yang S., Li J., Et al., A particle swarm optimization clustering-based attribute generalization privacy protection scheme, Journal of Circuits, Systems and Computers, 27, 11, pp. 121-171, (2018)
  • [22] Dargahi T., Ambrosin M., Conti M., Et al., ABAKA: a novel attribute-based k-anonymous collaborative solution for LBSs, Computer Communications, 85, 2016, pp. 1-13, (2016)
  • [23] Tang Q.Y., Ma C.G., Guang Y., Comparing private numbers based on fully homomorphic encryption, Journal of Information Engineering University, 13, 6, pp. 654-663, (2012)
  • [24] Wang X.F., Mu Y., Chen R.M., One-round privacy-preserving meeting location determination for smartphone applications, IEEE Transactions on Information Forensics and Security, 11, 8, pp. 1723-1732, (2016)
  • [25] Palanisamy B., Liu L., Lee K., Et al., Anonymizing continuous queries with delay-tolerant mix-zones over road networks, Distributed and Parallel Databases, 32, 1, pp. 91-118, (2014)
  • [26] Palanisamy B., Liu L., Attack-resilient mix-zones over road networks: architecture and algorithms, IEEE Transactions on Mobile Computing, 14, 3, pp. 495-508, (2015)