CP-ABE based users collaborative privacy protection scheme for continuous query

In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the sna...

Full description

Saved in:
Bibliographic Details
Main Authors: Lei ZHANG, Chun-guang MA, Song-tao YANG, Zeng-peng LI
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-09-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017184/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539518279188480
author Lei ZHANG
Chun-guang MA
Song-tao YANG
Zeng-peng LI
author_facet Lei ZHANG
Chun-guang MA
Song-tao YANG
Zeng-peng LI
author_sort Lei ZHANG
collection DOAJ
description In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.
format Article
id doaj-art-802d7eee66a54d69aa88219727c2c7d3
institution Kabale University
issn 1000-436X
language zho
publishDate 2017-09-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-802d7eee66a54d69aa88219727c2c7d32025-01-14T07:12:58ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-09-0138768559712116CP-ABE based users collaborative privacy protection scheme for continuous queryLei ZHANGChun-guang MASong-tao YANGZeng-peng LIIn location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017184/location-based servicesprivacy protectionattribute encryptionattribute anonymity
spellingShingle Lei ZHANG
Chun-guang MA
Song-tao YANG
Zeng-peng LI
CP-ABE based users collaborative privacy protection scheme for continuous query
Tongxin xuebao
location-based services
privacy protection
attribute encryption
attribute anonymity
title CP-ABE based users collaborative privacy protection scheme for continuous query
title_full CP-ABE based users collaborative privacy protection scheme for continuous query
title_fullStr CP-ABE based users collaborative privacy protection scheme for continuous query
title_full_unstemmed CP-ABE based users collaborative privacy protection scheme for continuous query
title_short CP-ABE based users collaborative privacy protection scheme for continuous query
title_sort cp abe based users collaborative privacy protection scheme for continuous query
topic location-based services
privacy protection
attribute encryption
attribute anonymity
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017184/
work_keys_str_mv AT leizhang cpabebaseduserscollaborativeprivacyprotectionschemeforcontinuousquery
AT chunguangma cpabebaseduserscollaborativeprivacyprotectionschemeforcontinuousquery
AT songtaoyang cpabebaseduserscollaborativeprivacyprotectionschemeforcontinuousquery
AT zengpengli cpabebaseduserscollaborativeprivacyprotectionschemeforcontinuousquery