计算机科学 ›› 2015, Vol. 42 ›› Issue (4): 101-105.doi: 10.11896/j.issn.1002-137X.2015.04.019

• 信息安全 • 上一篇    下一篇

基于密文检索的位置服务用户隐私保护方案

刘树波,李艳敏,刘梦君   

  1. 武汉大学空天信息安全与可信计算教育部重点实验室 武汉430072 武汉大学计算机学院 武汉430072,武汉大学空天信息安全与可信计算教育部重点实验室 武汉430072 武汉大学计算机学院 武汉430072,武汉大学空天信息安全与可信计算教育部重点实验室 武汉430072 武汉大学计算机学院 武汉430072
  • 出版日期:2018-11-14 发布日期:2018-11-14

Privacy-preserving for Location-based Service over Encrypted Data Search

LIU Shu-bo, LI Yan-min and LIU Meng-jun   

  • Online:2018-11-14 Published:2018-11-14

摘要: 在基于位置服务系统中,为用户提供高质量服务的同时如何很好地保护用户的隐私(身份、行踪以及偏好等)仍然是一个挑战。针对这一挑战,提出了基于密文检索的位置服务用户隐私保护方案。在本方案中,位置服务提供商将其服务数据以及数据向量索引以密文的形式外包给云端,移动用户通过密文查询请求向云端查询所需服务,云端通过用户的查询以及服务数据索引计算出匹配度高的服务数据并返回给用户,整个交互过程都是以密文形式进行,云端以及外界得不到任何明文信息。本方案不依赖集中匿名器和用户协作,最后通过理论以及实验分析表明,本方案以低的计算开销有效地保护了用户的身份、位置以及查询偏好隐私。

关键词: 基于位置服务,隐私保护,密文检索,匹配度

Abstract: In location-based service system,it is a vital problem to protect user’s privacy including identity privacy,location privacy and preference privacy, and gain high quality service for users at the same time.This paper proposed a privacy-preserving scheme based on encrypted data search.Location-based service provider outsources its encrypted data and index to cloud server who executes user’s LBS queries and returns the top-K results to user according to matching score.The scheme does not rely on user’s cooperation and any trusted third party.Finally theoretical and experimental analysis shows that the proposed scheme can effectively protect user’s identity,location and preference privacy with a lower computation and communication overhead.

Key words: Location-based service,Privacy-preserving,Searchable encryption,Matching score

[1] Leitner M,Curtis .A first step towards a framework for presenting the location of confidential point data on maps-results of an empirical perceptual study[J].International Journal of Geographical Information Science,2006,20(7):813-822
[2] Shankar P,Ganapathy V,Iftode L.Privately querying location-based services with Sybilquery[C]∥Proceedings of the 11th International Conference on Ubiquitous Computing (UbiComp,ACM).2009:31-40
[3] Chang Wei,Wu Jie,Tan Chiu-Chiang .Enhancing mobile social network privacy[C]∥Proceedings of the IEEE Global Communications Conference (Globecom).2011:1-5
[4] Wei Wei,Xu Feng-yuan,Li Qun.Flexible Privacy-preserving location sharing in mobile online social networks[C]∥Procee-dings of the 31st IEEE International Conference on Computer Communications (INFOCOM).2012:2616-2620
[5] Gedik B,Liu Ling.Location privacy in mobile systems:A per-sonalized anonymization model[C]∥Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS).2005:620-629
[6] Chow Chi-Yin,Mokbel M F,Walid G.The new Casper:Query processing for location services without compromising privacy[C]∥Proceedings of the 32nd International Conference on Ver Large Data Base.2006:763-774
[7] Chow Chi-Yin,Mokbel M F,He Tian.A privacy-preserving location monitoring system for wireless sensor networks[J].IEEE Transactions on Mobile Computing,2010:94-107
[8] Chow Chi-Yin,Mokbel M F,Leong V.On Efficient and Scalable Support of Continuous Queries in Mobile Peer-to-Peer Environments[J].IEEE Transactions on Mobile Computing,2011,10(10):1473-1487
[9] Beresford A R,Stajano F.Location privacy in pervasive computing[J].IEEE Pervasive Computing,2003,2(1):46-55
[10] Pfitzmann A,Kohntopp M.Anonymity,unobservability,andpseudonymity-a proposal for terminology[C]∥Designing privacy enhancing technologies.2001:1-9
[11] Dingledine R,Mathewson N,Syverson P.Tor:The second-generation onion router[C]∥Proceedings of the 13th USENIX Security Symposium (Security’04).2004:303-320
[12] Chow Chi-Yin,Mokbel M F,Liu Xuan.A peer-to-peer spatialcloaking algorithm for anonymous location-based services[C]∥Proc of the 14th ACM International Symposium on Advances in Geographic Information Systerms.NewYork:ACM Press,2006:171-178
[13] Mokbel M F,Chow Chi-Yin,Aref W G.The new casper:aprivacy-aware location-based database server.http://www-users.cs.umn.edu
[14] Ghinita G,Kalnis P,Skiadopoulos S.A mobile peer-to-peer system for anomymous location-based queries[C]∥Proc.of the 10th International Symposium on Advances in Spatial and Temporal Databases.Berlin:Springer-Verlag,2007:519-523
[15] Kalnis P,Ghinita G,Mouratidis K,et al.Preventing location- based identity inference in anonymous spatial queries[C]∥IEEE Trans.Knowl.Data Eng..2007:1719-1733
[16] Lu Rong-xing,Lin Xiao-dong,Shi Zhi-guo,et al.PLAM:A privacy-preserving framework for local-area mobile social networks[C]∥Proceedings of the 33st IEEE International Confe-rence on Computer Communications.2014
[17] Niu Ben,Li Qing-hua,Zhu Xiao-yan,et al.Achieving k-anonymity in Privacy-Aware Location-Based Services[C]∥Proceedings of the 33st IEEE International Conference on Computer Communications.2014
[18] Shao Jun,Lu Rong-xing,Lin Xiao-dong.FINE:A fine-grained privacy-preserving location-based service framework for mobile devices[C]∥Proceedings of the 33st IEEE International Conference on Computer Communications.2014
[19] Blaze M,Bleumer G,Strauss M.Divertible protocols and atomic proxy cryptography[C]∥Proceedings of Eurocrypt.1998,1403:127-144
[20] Wong W K,Cheung D W,Kao B.Secure knn computation on encrypted databases[C]∥Proceedings of the 35th SIGMOD International Conference on Management of Data.2009:139-152
[21] Cao N,Wang C,Li M,et al.Privacy-preserving Multi-keyword ranked search over encrypted cloud data[C]∥IEEE INFOCOM.2011:829-837

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!