Privacy-preserving Revocable Content Sharing in Geosocial Networks

被引:0
|
作者
Guo, Linke [1 ]
Zhang, Chi [2 ]
Fang, Yuguang [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] Univ Sci & Technol China, Sch Informat Sci & Technol, Anhua 230026, Peoples R China
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Location-Based Service; Privacy; Content Sharing; Revocation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Location-based services enable people to obtain various kinds of services based on their current locations. Recently, the geosocial networking services, which utilize mobile users' location information to realize social interactions, lead to numerous fascinating applications, such as content sharing, social shopping, food sourcing, and so on. However, extensive and unnecessary uses of mobile users' spatial and temporal information pose conspicuous privacy threats not only to their locations, but also to the shared contents, which may contain sensitive information, such as special interests, real identity, and crucial social relationships. To preserve the privacy of mobile users, we may apply the attribute-based encryption (ABE) schemes to secure mobile users' location and their contents. Unfortunately, existing approaches fail to jointly consider the privacy of the past shared contents and the accessibility of the updated contents for non-revoked users. In this paper, we propose a privacy-preserving revocable content sharing scheme in geosocial networks. Our scheme allows mobile users to share their encrypted location-based contents on an untrusted server without revealing actual location information, and further enables other mobile users who physically check in at the particular location to search and decrypt the content if they have the corresponding attributes. Importantly, to secure mobile users' past shared contents and the corresponding location information, we design an efficient ciphertext update scheme to allow encrypted shared contents to be periodically updated and become inaccessible to revoked users. By trace-driven simulations, we show both the efficiency and privacy preservation of the proposed scheme.
引用
收藏
页码:118 / 126
页数:9
相关论文
共 50 条
  • [31] PrivateLink: Privacy-Preserving Integration and Sharing of Datasets
    Lim, Hoon Wei
    Poh, Geong Sen
    Xu, Jia
    Chittawar, Varsha
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 564 - 577
  • [32] Privacy-Preserving Data Sharing in Telehealth Services
    Odeh, Ammar
    Abdelfattah, Eman
    Salameh, Walid
    APPLIED SCIENCES-BASEL, 2024, 14 (23):
  • [33] Privacy-preserving Data Sharing in Portable Clouds
    Zeidler, Clemens
    Asghar, Muhammad Rizwan
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, VOL 2 (CLOSER), 2016, : 274 - 281
  • [34] Privacy-Preserving Sharing of Mobile Sensor Data
    Liu, Yin
    Cruz, Breno Dantas
    Tilevich, Eli
    MOBILE COMPUTING, APPLICATIONS, AND SERVICES, MOBICASE 2021, 2022, 434 : 19 - 41
  • [35] Privacy-Preserving Sharing of Sensitive Information Introduction
    Stolfo, Salvatore J.
    Tsudik, Gene
    IEEE SECURITY & PRIVACY, 2010, 8 (04) : 16 - 17
  • [36] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    JournalofComputerScience&Technology, 2010, 25 (03) : 401 - 414
  • [37] Privacy-preserving logistic regression with secret sharing
    Ghavamipour, Ali Reza
    Turkmen, Fatih
    Jiang, Xiaoqian
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2022, 22 (01)
  • [38] Privacy-preserving photo sharing based on blockchain
    Pfister, Pablo
    Ebrahimi, Touradj
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XLIII, 2020, 11510
  • [39] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [40] Privacy-preserving sharing and correlation of security alerts
    Lincoln, P
    Porras, P
    Shmatikov, V
    USENIX ASSOCIATION PROCEEDINGS OF THE 13TH USENIX SECURITY SYMPOSIUM, 2004, : 239 - 254