[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3331453.3361312acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

A Location Privacy Protection Scheme Based on Hybrid Encryption

Published: 22 October 2019 Publication History

Abstract

Based on hybrid encryption algorithms, this paper presents a novel location privacy protection scheme with the aid of the cloud server. The scheme can effectively protect both the location privacy of the query user and the data privacy of the data service provider in location-based services. Using cloud servers and hybrid encryption algorithms (i.e., AES and Paillier homomorphic encryption), the proposed scheme can greatly reduce the storage cost, and the communication cost of the data service provider.

References

[1]
A. Ergüzen, M. Ünver (2018). Developing a File System Structure to Solve Healthy Big Data Storage and Archiving Problems Using a Distributed File System. Applied Sciences, 8(6), 913.
[2]
L. Malina, P. Dzurenda, J. Hajny (2018). Evaluation of anonymous digital signatures for privacy-enhancing mobile applications. International Journal of Security and Networks, 13(1), 27--41.
[3]
V. Villarreal, R. Hervas, J. Bravo (2016). A Systematic Review for Mobile Monitoring Solutions in M-Health. Journal of Medical Systems, 40(9), 199.
[4]
W. Chang, J. Wu, C.C. Tan (2011). Friendship-based location privacy in Mobile Social Networks. International Journal of Security and Networks, 6(4), 226--236.
[5]
M. Ahmadi, B.S. Ghahfarokhi (2016). Preserving Privacy in Location Based Mobile Coupon Systems Using Anonymous Authentication. In Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, IEEE, pp. 60--65.
[6]
X.Y. Wang, L. Dong, C. Xu (2015). Location Privacy Protecting based on Anonymous Technology in Wireless Sensor Networks. In Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms and Programming, IEEE, pp. 229--235.
[7]
Y. Che, Q. Yang, X. Hong (2012). A Dual-active Spatial Cloaking Algorithm for Location Privacy Preserving in mobile Peer-to-Peer networks. In Proceedings of the 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2543--2548.
[8]
C.Y. Chow, M.F. Mokbel, H.V. Leong (2011). On Efficient and Scalable Support of Continuous Queries in Mobile Peer-to-Peer Environments. IEEE Transactions on Mobile Computing, 10(10), 1473--1487.
[9]
N. Li, T. Li, S. Venkatasubramanian (2010). Closeness: A new privacy measure for data publishing. IEEE Transactions on Knowledge and Data Engineering, 22(7), 943--956.
[10]
R. Ghasemi, A.M.M. Al, N. Mohammed, M.H. Dhkordi, X.Q. Jiang (2016). Private and Efficient Query Processing on Outsourced Genomic Databases. IEEE Journal of Biomedical & Health Informatics, 21(5), 1466.
[11]
B. Niu, Z. Zhang, X. Li, et al. (2014). Privacy-area aware dummy generation algorithms for Location-Based Services. In Proceedings of 2014 International Conference on Communications, IEEE, pp. 957--962.
[12]
Q.C. To, T.K. Dang, J. Kung (2013). A Hilbert-based framework for preserving privacy in location-based services. International Journal of Intelligent Information and Database Systems, 7(2), 113--134.
[13]
X. Pan, J. Xu, X. Meng (2012). Protecting location privacy against location-dependent attacks in mobile services. IEEE Transactions on Knowledge and Data Engineering, 24(8), 1506--1519.
[14]
L. Kuang, Y. Wang, P.J. Ma, et al. (2017). An Improved Privacy-Preserving Framework for Location-Based Services Based on Double Cloaking Regions with Supplementary Information Constraints. Security and Communication Networks, https://doi.org/10.1155/2017/7495974.
[15]
B. Bamba, L. Liu, P. Pesti, et al. (2008). Supporting anonymous location queries in mobile environment with privacy grid. In Proceedings of the 17th International Conference on World Wide Web, ACM, pp. 237--246.
[16]
T.C. Li, W.T. Zhu (2012). Protecting user anonymity in location-based services with fragmented cloaking region. In Proceedings of Computer Science and Automation Engineering (CSAF), IEEE, vol.3, pp. 227--231.
[17]
X. Yi, R. Paulet, E. Bertino, V. Varadharajan (2016). Practical Approximate K Nearest Neighbor Queries with Location and Query Privacy. IEEE Transaction on Knowledge and Data Engineering, 28(6), 1546--1559.
[18]
H. Jannati, B. Bahrak (2017). An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy. Wireless Personal Communications, 97(2), 3113--3123.
[19]
D. Zhao, J. Ma, X. Wang, et al. (2016). Personalized Location Anonymity - A Kernel Density Estimation Approach. In Proceedings of International Conference on Web-Age Information Management (WAIM), LNCS, vol. 9659, pp. 52--64.
[20]
M. Gruteser and D. Grunwald (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of ACM MobiSys, pp. 31--42.
[21]
B. Gedik and L. Liu (2005). Location privacy in mobile systems: A personalized anonymization model. In Proceedings of IEEE ICDCS, pp. 620--629.
[22]
T. Xu and Y. Cai (2008). Exploring historical location data for anonymity preservation in location-based services In Proceedings of IEEE INFOCOM, pp. 1220--1228.
[23]
G. Zhong and U. Hengartner (2009). A distributed k-anonymity protocol for location privacy. In Proceedings of IEEE PerCom, pp. 1--10.
[24]
Z. Huo, Y. Huang, and X. Meng (2011). History trajectory privacy-preserving through graph partition. In Proceedings of ACM Workshop Mobile LocationBased Service, pp. 71--78.
[25]
J. Li, H. Yan, Z. Liu, et al. (2017). Locationsharing systems with enhanced privacy in mobile online social networks. IEEE Syst. J., 11(2): 439--448.
[26]
S. Mascetti et al. (2011). Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies. The VLDB Journal, 20(4): 541--566.
[27]
P. Chen, Y. Lin, W. Zhang, et al. (2016). Preserving location and content privacy for secure ranked queries in location based services. In Proceedings of IEEE Trustcom/BigDataSE/ISPA, pp. 892--899.
[28]
H. Zhu, R. Lu, C. huang, et al. (2016). An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud. IEEE Transactions on Vehicular Technology, 65(9): 7729--7739.
[29]
Q. Xie and L. Wang. (2016). Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data. Sensors, 16(12): 1993.

Cited By

View all
  • (2022)A blockchain anonymity solution to prevent location homogeneity attacksConcurrency and Computation: Practice and Experience10.1002/cpe.732634:27Online publication date: 17-Sep-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSAE '19: Proceedings of the 3rd International Conference on Computer Science and Application Engineering
October 2019
942 pages
ISBN:9781450362948
DOI:10.1145/3331453
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 October 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. AES
  2. Cloud storage
  3. Location privacy
  4. Location-based services
  5. Paillier encryption

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Natural Science Key Fund of Education Department of Anhui Province

Conference

CSAE 2019

Acceptance Rates

Overall Acceptance Rate 368 of 770 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)A blockchain anonymity solution to prevent location homogeneity attacksConcurrency and Computation: Practice and Experience10.1002/cpe.732634:27Online publication date: 17-Sep-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media