Skip to main content

Location Privacy Preserving Scheme Based on Attribute Encryption

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10066))

  • 1403 Accesses

Abstract

There are only two modes, “public” or “private” to manage the user’s location information in the social network. However, in some cases, users need to inform some people of their exact location, and the other people are only access to the inaccurate, maybe fuzzy location information. Therefore, we design a location privacy preserving scheme based on attribute encryption, which provides “precise”, “more accurate”, “fuzzy” and “private” four modes to manage the location information. The scheme based on the algorithm of WT-CP-ABE [1]. The location information is divided into three parts according to different ranks of intimacy, then we encrypt the key information and position information with attribute-based encryption and symmetric encryption respectively, and then issue the ciphertext to the social network. We analyze the security of the scheme, which shows that the scheme has the advantages of user attribute information confidentiality, data confidentiality and it can resist the collusion attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lv, Z.Q., HONG, C., ZHANG, M., et al.: Privacy-perserving scheme for social networks. J. Commun. 35(8), 23–32 (2014)

    Google Scholar 

  2. Chow, C.Y., Mokbel, M.F., Aref, W.G.: Casper*: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on Very Large Data Bases, VLDB Endowment, pp. 763–774 (2006)

    Google Scholar 

  3. Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Proceedings of the International Conference on Pervasive Services 2005, ICPS 2005, pp. 88–97 (2005)

    Google Scholar 

  4. Man, L.Y., Jensen, C.S., Huang, X., et al.: SpaceTwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: International Conference on Data Engineering, pp. 366–375 (2008)

    Google Scholar 

  5. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: International Conference on Mobile Systems, Applications, and Services, pp. 31–42 (2003)

    Google Scholar 

  6. Chen, W.H., Li, W.J., Zhu, J.: A model for protecting location privacy against attacks from friends in SNS. Comput. Eng. Sci. 37(4), 692–698 (2015)

    MathSciNet  Google Scholar 

  7. Boneh, D., Franklin, F.: Identity-based encryption from the Weil pairing. Adv. Cryptology 32(3), 586–615 (2001). Crypt’ 2001

    MathSciNet  MATH  Google Scholar 

  8. Bethencourt, J.,Sahai, A.,Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 28th International Symposium on Security and Privacy (S&P 2007). Berkeley, CA, USA, 321–334 (2007)

    Google Scholar 

  9. Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. Ph.D thesis, Israel Institute of Technology, Technion, Haifa, Israel (1996)

    Google Scholar 

  10. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_4

    Chapter  Google Scholar 

  11. Liang, X., Li, X., Lu, R., et al.: An efficient and secure user revocation scheme in mobile social networks. In: Global Telecommunications Conference (GLOBECOM 2011), pp. 1–5. IEEE (2011)

    Google Scholar 

  12. Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2010)

    Article  Google Scholar 

  13. Yu, S., Wang, C., Ren, K., et al.: Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13–16, 2010, pp. 261–270 (2010)

    Google Scholar 

  14. Jahid, S., Mittal, P., Borisov, N.: EASiER: encryption-based access control in social networks with efficient revocation. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 2011, pp. 411–415 (2011)

    Google Scholar 

  15. Zhang, M., Lv, Z., Feng, D., et al.: A secure and efficient revocation scheme for fine-grained access control in cloud storage. In: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 545–550. IEEE (2012)

    Google Scholar 

Download references

Acknowledgments

This work is supported by National Natural Science Foundation of China (61572521, 61272492, 61272468), Project funded by Natural Science Basic Research Plan in Shaanxi Province of China (2015JM6353) and Basic Research Plan of Engineering College of the Chinese Armed Police Force (WJY201523, WJY201613).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yiliang Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Lin, X., Han, Y., Ke, Y., Yang, X. (2016). Location Privacy Preserving Scheme Based on Attribute Encryption. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10066. Springer, Cham. https://doi.org/10.1007/978-3-319-49148-6_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49148-6_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49147-9

  • Online ISBN: 978-3-319-49148-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics