期刊文献+

APPLSS:Adaptive Privacy Preserved Location Sharing Scheme Based on Attribute-Based Encryption

下载PDF
导出
摘要 Unauthorized access to location information in location-based service is one of the most critical security threats to mobile Internet.In order to solve the problem of quality of location sharing while keeping privacy preserved,adaptive privacy preserved location sharing scheme called APPLSS is proposed,which is based on a new hierarchical ciphertext-policy attribute-based encryption algorithm.In the algorithm,attribute authority sets the attribute vector according to the attribute tags of registration from the location service providers.Then the attribute vector can be adaptively transformed into an access structure to control the encryption and decryption.The APPLSS offers a natural hierarchical mechanism in protecting location information when partially sharing it in mobile networks.It allows service providers access to end user’s sensitive location more flexibly,and satisfies a sufficient-but-no-more strategy.For end-users,the quality of service is obtained while no extra location privacy is leaked.To improve service response performance,outsourced decryption is deployed to avoid the bottlenecks of the service providers and location information providers.The performance analysis and experiments show that APPLSS is an efficient and practical location sharing scheme.
出处 《China Communications》 SCIE CSCD 2021年第3期105-121,共17页 中国通信(英文版)
基金 supported by the National Natural Science and Foundation of China(61572521) Research and Innovation term of Engineering University of PAP(KYTD201805).
  • 相关文献

参考文献1

二级参考文献25

  • 1KWAK H, LEE C, PARK H, et al. What is Twitter, a social network or a news media[A]. Proceedings of the 19th International Conference on World Wide Web[C]. Raleigh, NC, USA, 2010. 591-600.
  • 2FOGEL J, NEHMAD E. Internet social network communities: risk taking, trust, and privacy concerus[J]. Computers in Human Behavior, 2009, 25(1): 153-160.
  • 3LUCAS M, BORISOV N. Flybynight: mitigating the privacy risks of social networking[A]. Proceedings of the 7th ACM Workshop on Pri- vacy in the Electronic Society[C]. Alexandria, VA, USA, 2008. 1-8.
  • 4GUHA S, TANG K, FRANCIS P. NOYB: privacy in online social networks[A]. Proceedings of the First Workshop on Online Social Networks[C]. Seattle, WA, USA, 2008.49-54.
  • 5LUO W, XIE Q, HENGARTNER U. Facecloak: an architecture for user privacy on social networking sites[A]. Proceedings of the 12th International Conference on Computational Science and Engineering (CSE 2009)[C]. Vancouver, BS, Canada, 2009.26-33.
  • 6SUN J, ZHU X, FANG Y. A privacy-preserving scheme for online social networks with efficient revocation[A]. Proceedings of the 29th International Conference on Computer Communications (INFOCOM 2010)[C]. SanDiego, CA, USA, 2010. 1-9.
  • 7BADEN R, BENDER A, SPRING N, et al. Persona: an online social network with user-defined privacy[A]. Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication (SIGCOMM 2009)[C]. Barcelona, Spain, 2009. 135-146.
  • 8JAHID S, MITTAL P, BORISOV N. EASIER: encryption-based ac- cess control in social networks with efficient revocation[A]. Proceed- ings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)[C]. HungKong, China, 2011. 411-415.
  • 9LIANG X, LI X, LU R, et al. An efficient and secure user revocation scheme in mobile social networks[A]. Proceedings of International Conference on Global 2011)[C]. Houston. TX, USA, 2011.1-5.
  • 10BETHENCOURT J, SAHAI A, WATERS B. Ciphcrtvxt-policy attrib- ute-based ~ncryption[A]. Proceedings of the 28th International Sym- posium on Security and Privacy (S&P 2007)[C]. Berkeley, CA, USA, 2007.321-334.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部