期刊文献+

面向车载自组网的高效位置隐私保护查询方案 被引量:4

Efficient Location Privacy Preserving Query Scheme Oriented to VANETs
下载PDF
导出
摘要 随着车载自组网应用对安全性要求的提高,用户和服务提供商对各自私有信息保密性的要求也越来越高。针对现有查询方案无法同时保护车辆身份、位置及服务提供商数据隐私的问题,利用私有信息检索技术,提出一种高效的位置服务查询方案。采用匿名认证的方法进行车辆间的相互认证与车辆及路边基站的认证。在此基础上,使用安全硬件对数据库的数据进行混淆处理,通过代理重加密完成车辆对数据库服务数据的检索,从而实现车辆和数据库双方的隐私保护。分析结果表明,该方案可实现车辆身份匿名查询,能够保护车辆位置隐私和服务提供商的数据库信息,且只需两轮通信,具有较高的通信效率。 With the enhanced security requirements of the Vehicular Ad Hoc Networks(VANETs) applications, vehicles and service providers have a high demand on their privacy information. The traditional privacy preserving query schemes of mobile devices cannot both protect the privacy information of the vehicle and the service provider database. This paper proposes an efficient location service query scheme by using the Private Information Retrieval(PIR) technology. Vehicles verify other vehicles and roadside base station by anonymous authentication. Meanwhile, the data of the service provider database is confused by the secure coprocessor, and the query service is implemented by the Proxy Re-cryptography(PRC) algorithm. The scheme can protect the privacy information of both vehicle and service provider database. Analysis shows that this scheme not only achieves the vehicle's anonymous query, but also protects both the location privacy of vehicles and the data privacy of service provider databases. Moreover, the communication cost is only twice, and has the high efficiency of communication.
作者 郭松矗 崔杰
出处 《计算机工程》 CAS CSCD 2014年第6期99-103,共5页 Computer Engineering
基金 国家自然科学基金资助项目(61173188)
关键词 车载自组网 基于位置服务 代理重加密 双线性映射群 匿名认证 Vehicular Ad Hoc Networks(VANETs) Location-based Services(LBS) Proxy Re-cryptography(PRC) bilinear mapping groups anonymous authentication
  • 相关文献

参考文献13

  • 1Drane C R, Rizos C. Positioning Systems in Intelligent Transportation Systems[M]. Boston, USA: [s. n.], 1997.
  • 2常促宇,向勇,史美林.车载自组网的现状与发展[J].通信学报,2007,28(11):116-126. 被引量:191
  • 3吴静,刘衍珩,王健,李伟平.车载自组网的可信认证与信任评估框架[J].通信学报,2009,30(S1):107-113. 被引量:9
  • 4McDiarmid A, Irvine J. Achieving Anonymous Location-based Services[C]//Proc. of Vehicular Technology Conference. Los Angeles, USA: IEEE Press, 2004: 1-6.
  • 5Mokbel M F, Chow C Y, Aref W G. The New Casper: Query Processing for Location Services Without Compromising Privacy[C]//Proc. of International Conference on Very Large Data Bases. Seoul, Korea: VLDB Endowment, 2006: 763-774.
  • 6Yiu Man-Lung. Spacetwist: Managing the Trade-offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services[C]//Proc. of International Conference on Data Engineering. Cancun, Mexico: IEEE Press, 2008: 366-375.
  • 7Giudici F. CAESAR: An Urban Location Service for VANETs[J]. ACM SIGMOBILE Mobile Computing and Communications Review, 2007, 11(2): 45-46.
  • 8Chim T W, Yiu S M, Hui L C K, et al. OPQ: OT-based Private Querying in VANETs[J]. IEEE Transactions on Intelligent Transportation Systems, 2011, 12(4): 1413-1422.
  • 9Lin Yao, Liu Chi, Liu Guangya, et al. Location Anonymity Based on Fake Queries in Continuous Location-based Services[C]//Proc. of International Conference on Availability, Reliability and Security. Prague, Czech Republic: IEEE Press, 2012: 85-93.
  • 10Smith S W, Safford D. Practical Server Privacy with Secure Coprocessors[J]. IBM Systems Journal, 2001, 40(3): 683-695.

二级参考文献83

共引文献198

同被引文献36

  • 1Daniel J,Taliwal V,Meier A,et al.Design of 5.9 GHz DSRC-based Vehicular Safety Communication[J].IEEE Wireless Communications,2006,13(5):36-43.
  • 2Yousefi S,Mousavi M S,Fathy M.Vehicular Ad Hoc Networks(VANETs):Challenges and Perspectives[C]//Pro-ceedings of the 6th International Conference on Telecom-munications.Washington D.C.,USA:IEEE Press,2006:761-766.
  • 3Isaac J T,Zeadally S,Camara J S.Security Attacks and Solutions for Vehicular Ad Hoc Networks[J].IET Communications,2010,4(7):894-903.
  • 4Xiao Xuefeng,Li Yong,Kui Xiaoyan.Relay Schemes for Intermittently Connected Vehicular Networks with Heterogeneous Nodes[C]//Proceedings of Wireless Communications and Networking Conference.Washington D.C.,USA:IEEE Press,2014:2700-2704.
  • 5Bi Yuanguo,Cai Lin,Shen Xuemin,et al.A Cross Layer Broadcast Protocol for Multihop Emergency Message Dissemination in Inter-vehicle Communication[C]//Proceedings of IEEE International Conference on Communications.Washington D.C.,USA:IEEE Press,2010:1-5.
  • 6Liu Benyuan,Firoiu V,Kurose J,et al.Capacity of Cache Enabled Content Distribution Wireless Ad Hoc Networks[C]//Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.Washington D.C.,USA:IEEE Press,2014:309-317.
  • 7Ahlswede R,Cai Ning,Shuo-Yen R L,et al.Network Information Flow[J].IEEE Transactions on Information Theory,2000,46(4):1204-1216.
  • 8Ho T,Médard M,Koetter R,et al.A Random Linear Network Coding Approach to Multicast[J].IEEE Tran-sactions on Information Theory,2006,52(10):4413-4430.
  • 9Noura H,Martin S,Agha K,et al.ERSS-RLNC:Efficient and Robust Secure Scheme for Random Linear Network Coding[J].Computer Networks,2014,75(24):99-112.
  • 10Sorour S,Valaee S.On Minimizing Broadcast Completion Delay for Instantly Decodable Network Coding[C]//Pro-ceedings of IEEE International Conference on Com-munications.Washington D.C.,USA:IEEE Press,2010:1-5.

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部