Computer Science ›› 2018, Vol. 45 ›› Issue (10): 142-149.doi: 10.11896/j.issn.1002-137X.2018.10.027

• Information Security • Previous Articles     Next Articles

Mobile Location Privacy Protection Based on Anonymous Routing

XIONG Wan-zhu, LI Xiao-yu   

  1. School of Information Engineering,Zhengzhou University,Zhengzhou 450000,China
  • Received:2017-09-11 Online:2018-11-05 Published:2018-11-05

Abstract: To preserve the security of mobile location pravicy based on location services,a mobile location pravicy protection model based on anonymous routing was presented.This model makes every mobile node as a forwarder and uses rerouting to select a route.It uses random selected mobile node as first forwarder,queries issued by it are firstly encrypts with public key of the location information server and secondly encrypted with the public key of first forwarder.Then mobile sending node sends it to first forwarder.The first forwarder receives it and decides next hop which is either location information server or second forwarder,the first forwarder firstly decrypts it with private key of first forwar-der,then secondly encrypts it with the public key of next hop.If next hop is second forwarder,it does what the first forwarder does until the location information server receives this message.Theoretical analysis and experimental results show that the mobile location privacy protection model can ensure the location privacy of location information server and any forwarder node can acquire mobile nodes,and it can realize the location privacy protection of a mobile node at a low price.Moreover,forwarder node can be any node in the mobile network,so this model is robust and can’t fail due to the faults of some nodes.

Key words: Mobile location privacy, Anonymous routing, Encryption mechanism, Safety, Anonymity

CLC Number: 

  • TP393
[1]SHIN K G,JU X,CHEN Z,et al.Privacy protection for users of location-based services[J].Wireless Communications IEEE,2012,19(1):30-39.
[2]CHAUM D L.Untraceble electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-88.
[3]SYVERSON P F,GOLDSCHLAG D M,REED M G.Anonymous Connections and Onion Routing[C]∥IEEE Symposium on Security and Privacy.IEEE Computer Society,1997:44.
[4]DINGLEDINE R,MATHEWSON N,SYVERSON P.Tor:the second-generation onion router[C]∥Conference on Usenix Security Symposium.USENIX Association,2004:21.
[5]RELTER M K,RUBIN A D.Crowds:Anonymity for web Transactions[J].ACM Transactions on Information and System Security,1998,1(1):62-92.
[6]PENG Z Y,LI S P.Protecting Location Privacy in Location- based Services in Mobile Environments[J].Journal of Electroni-cs & Information Technology,2011,33(5):1211-1216.(in Chinese)
彭志宇,李善平.移动环境下LBS位置隐私保护[J].电子与信息学报,2011,33(5):1211-1216.
[7]SWEENEY L.k-ANONYMITY:A Moedl for Protecting Privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570.
[8]LUO J,LIAO J G,LI X.LocPriv:a Scheme on Location Privacy Protection Based on Spatial Region Anonymity[J].Smallmicrocomputer Submission,2016,37(6):1273-1278.(in Chinese)
罗健,廖俊国,李雄.LocPriv:一种基于空间区域匿名的位置隐私保护方案[J].小型微型计算机系统,2016,37(6):1273-1278.
[9]GKOULALAS-DIVANIS A,KALNIS P,VERYKIOS V S.Providing K-Anonymity in location based services[J].ACM,2010,12(1):3-10.
[10]XU H Y,XU J GONG Y J,et al.Algorithms to Generate Location Privacy Protection with Spatial Cloaking[J].Journal of South China University of Technology(Natural Science Edition),2014,42(1):97-103.(in Chinese)
徐红云,许隽,龚羽菁,等.基于空间混淆位置隐私保护的位置隐私区域生成算法[J].华南理工大学学报(自然科学版),2014,42(1):97-103.
[11]KHOSHGOZARAN A,SHAHABI C.Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy[C]∥International Conference on Advances in Spatial and Temporal Databases.Springer-Verlag,2007:239-257.
[12]LIU X J,CHEN Y F,LI B.Mobile Location Privacy Protection Based on Untrusted Environment[J].Computer Science,2015,42(2):108-113.(in Chinese)
刘学军,陈玉凤,李斌.基于不可信环境的移动位置隐私保护[J].计算机科学,2015,42(2):108-113.
[13]HUO Z,MENG X F.A Surey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Comuputers,2011,34(10):1820-1830.(in Chinese)
霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830.
[14]MENG X F,PAN X.Privacy Preservation based on Location Services[J].Communications of the CCF,2010,6(6):16-23.(in Chinese)
孟晓峰,潘晓.基于位置服务的隐私保护[J].中国计算机协会通讯,2010,6(6):16-23.
[15]HUANG X H.Research on Location Privacy Preservation in Location-based Services[D].Chengdu:University of Electronic Science and Technology of China,2016.(in Chinese)
黄勋辉.基于位置服务的位置隐私保护研究[D].成都:电子科技大学,2016.
[16]SEN S,WANG J.Analyzing peer-to-peer traffic across large networks[J].IEEE/ACM Transactions on Networking,2004,12(2):219-232.
[17]REITER M K.Crowds:anonymity for Web transactions[J]. Acm Transactions on Information & System Security,1998,1(1):66-92.
[18]DIAZ C,CLAESSENS J,PRENEEL B.APES:Anonymity and Privacy in Electronic Services[J].Datenschutz Und Datensicherheit,2005,27(3):143-145.
[1] LV Xiao-hu, HAN Xiao-dong, GONG Jiang-lei, WANG Zhi-jie, LIU Xiao-kun. Systemic Muti-factors Based Verification Method for Safety-critical Software [J]. Computer Science, 2019, 46(9): 156-161.
[2] LV Zhi-quan, LI Hao, ZHANG Zong-fu, ZHANG Min. Topic-based Re-identification for Anonymous Users in Social Network [J]. Computer Science, 2019, 46(6): 143-147.
[3] XU Bing-feng, HE Gao-feng, ZHANG Li-ning. Risk Modeling for Cyber-physical Systems Based on State/Event Fault Trees [J]. Computer Science, 2019, 46(5): 105-110.
[4] ZHAO Meng-yao, LI Xiao-yu. Bidirectional Anonymous Secret Communication Protocol Based on Onion Routing [J]. Computer Science, 2019, 46(4): 164-171.
[5] TONG Hai,BAI Guang-wei,SHEN Hang. Double-auction-based Incentive Mechanism for k-anonymity [J]. Computer Science, 2019, 46(3): 202-208.
[6] ZHOU Yi-hua, ZHANG Bing, YANG Yu-guang, SHI Wei-min. Cluster-based Social Network Privacy Protection Method [J]. Computer Science, 2019, 46(10): 154-160.
[7] CHAI Lin-peng , ZHANG Bin. One-off Public Key Scheme for Preventing Dishonest Third Party Attacking [J]. Computer Science, 2018, 45(7): 139-142, 185.
[8] LI Yue,WANG Fang. Survey on Storage Security of Emerging Non-volatile Memory [J]. Computer Science, 2018, 45(7): 53-60.
[9] WU Zhong-zhong, LV Xin and LI Xin. Query Probability Based Dummy Location Selection Algorithm [J]. Computer Science, 2018, 45(5): 143-146, 162.
[10] CAO Min-zi, ZHANG Lin-lin, BI Xue-hua, ZHAO Kai. Personalized (α,l)-diversity k-anonymity Model for Privacy Preservation [J]. Computer Science, 2018, 45(11): 180-186.
[11] GAO Di, XU Zheng and LIU Yun-huai. Data Surge Models for Public Security Data Processing and Its Application in Unity of Security System [J]. Computer Science, 2017, 44(Z6): 342-347.
[12] WANG Li-e, XU Yuan-xin, LI Xian-xian and LIU Peng. P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System [J]. Computer Science, 2017, 44(9): 178-183.
[13] CAO Chun-ping and XU Bang-bing. Research of Privacy-preserving Tag-based Recommendation Algorithm [J]. Computer Science, 2017, 44(8): 134-139.
[14] HE Yun, WANG Wei and LI Tong. Formal Method for Describing Software Evolution Ability Feature [J]. Computer Science, 2017, 44(7): 128-136.
[15] MIAO Xu-dong, WANG Yong-chun, CAO Xing-chen and FANG Feng. Detection Approach for Security Vulnerability Based on Pattern Matching [J]. Computer Science, 2017, 44(4): 109-113.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .