Location Privacy Preserving Scheme Based on Attribute Encryption

被引:0
|
作者
Lin, Xi [1 ]
Han, Yiliang [1 ]
Ke, Yan [1 ]
Yang, Xiaoyuan [1 ]
机构
[1] Engn Univ Chinese Armed Police Force, Dept Elect Technol, Xian 710086, Peoples R China
关键词
Social network; Location; Privacy protection; Ranks of intimacy; Attribute-based encryption;
D O I
10.1007/978-3-319-49148-6_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are only two modes,"public" or "private" to manage the user's location information in the social network. However, in some cases, users need to inform some people of their exact location, and the other people are only access to the inaccurate, maybe fuzzy location information. Therefore, we design a location privacy preserving scheme based on attribute encryption, which provides "precise", "more accurate", "fuzzy" and "private" four modes to manage the location information. The scheme based on the algorithm of WT-CP-ABE [1]. The location information is divided into three parts according to different ranks of intimacy, then we encrypt the key information and position information with attribute-based encryption and symmetric encryption respectively, and then issue the ciphertext to the social network. We analyze the security of the scheme, which shows that the scheme has the advantages of user attribute information confidentiality, data confidentiality and it can resist the collusion attack.
引用
收藏
页码:164 / 177
页数:14
相关论文
共 50 条
  • [21] Efficient and privacy-preserving traceable attribute-based encryption in blockchain
    Axin Wu
    Yinghui Zhang
    Xiaokun Zheng
    Rui Guo
    Qinglan Zhao
    Dong Zheng
    Annals of Telecommunications, 2019, 74 : 401 - 411
  • [22] Attribute Based Privacy Protection Encryption Scheme Based on Inner Product Predicate
    Zhang, Zhiqiang
    Zhu, Youwen
    Wang, Jian
    Zhang, Yushu
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (03) : 828 - 835
  • [23] A Hybrid Two Layer Attribute Based Encryption for Privacy Preserving in Public Cloud
    Verma, Shiva
    Ahuja, Sachin
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 174 - 178
  • [24] Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption
    Liang, Pengfei
    Zhang, Leyou
    Shang, Yujie
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 66 - 80
  • [25] Two Practical Attribute-Based Encryption Schemes for Privacy-Preserving Mobile Location-Sharing Applications
    Chen, Zhenhua
    Li, Ni
    Huang, Luqi
    Jia, Xingxing
    Wang, Yilei
    Wang, Hao
    Su, Jing
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5148 - 5159
  • [26] Efficient and privacy-preserving traceable attribute-based encryption in blockchain
    Wu, Axin
    Zhang, Yinghui
    Zheng, Xiaokun
    Guo, Rui
    Zhao, Qinglan
    Zheng, Dong
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 401 - 411
  • [27] Privacy-Preserving Digital Rights Management based on Attribute-based Encryption
    Petrlic, Ronald
    Sorge, Christoph
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [28] An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy
    Jannati, Hoda
    Bahrak, Behnam
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 3113 - 3123
  • [29] The blockchain-based privacy-preserving searchable attribute-based encryption scheme for federated learning model in IoMT
    Zhou, Ziyu
    Wang, Na
    Liu, Jianwei
    Fu, Junsong
    Deng, Lunzhi
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (24):
  • [30] An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy
    Hoda Jannati
    Behnam Bahrak
    Wireless Personal Communications, 2017, 97 : 3113 - 3123