|Table of Contents|

Location privacy-preserving protocol based on secure multi-party sum and verifiable secret sharing


Research Field:
Publishing date:


Location privacy-preserving protocol based on secure multi-party sum and verifiable secret sharing
Li QianmuLi DeqiangZhao JianQi Yong
School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China
secure multi-party sum verifiable secret sharing location privacy-preserving dishonest users
To solve the problem that the existing TTP-free protocols cannot resist attacks from multiple dishonest users colluding with a location-based services(LBS)provider(P)efficiently,a location privacy-preserving protocol based on secure multi-party sum(SMS)and verifiable secret sharing(VSS)is proposed.SMS is used to compute the centroid sent to P as a cloaking location and VSS is used to encrypt the location,and location privacy-preserving is realized and the correctness of the cooperative user data is verified.Experiments show that the protocol can resist the passive and active attacks from insiders and outsiders and detect dishonest cooperative users efficiently,and it can provide strong location privacy-preserving for LBS.


[1] Mokbel M F.Privacy in location-based services:State-of-the-art and research directions[C]//2007 International Conference on Mobile Data Management.Mannheim,Germany:IEEE,2007:228-228.
[2]Zheng Kai,Shang Shuo,Yuan N J,et al.Towards efficient search for activity trajectories[C]//Proceedings of the 29th IEEE International Conference on Data Engineering.Brisbane,Australia:IEEE,2013:230-241.
[3]Abowd G D,Atkeson C G,Hong J,et al.CyberGuide:A mobile context-aware tour guide[J].Wireless Networks,1997,3(5):421-433.
[4]NextBus Inc.NextBus[EB/OL].http://www.nextbus.com,2015-03-30.
[5]Gruteser M,Grunwald D.Anonymous usage of location-based services through spatial and temporal cloaking[C]//Proceeding of the 1st International Conference on Mobile Systems,Applications and Services(MobiSys'03).New York,USA:ACM,2003:31-42.
[6]Kido H,Yanagisaway Y,Satoh T.An anonymous communication technique using dummies for location-based services[C]//Proceeding of International Conference on Pervasive Services 2005(ICPS'05).Munich,Germany:IEEE,2005:88-97.
[7]Yiu M L,Jensen C S,Huang Xuegang,et al.Spacetwist:Managing the trade-offs among location privacy,query performance,and query accuracy in mobile services[C]//IEEE 24th International Conference on Data Engineering(ICDE 2008).Cancun,Mexico:IEEE,2008:366-375.
[8]Khoshgozaran A,Shahabi C.Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy[C]//Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases(SSTD'07).Boston,MA,USA:Springer-Verlag Berlin,Heidelberg,2007:239-257.
[9]Kalnis P,Ghinita G,Mouratidis K A.Preventing location-based identity inference in anonymous spatial queries[J].IEEE Transactions on Knowledge and Data Engineering,2007,19(12):1719-1733.
[10]Gedik B,Liu Ling.Protecting location privacy with personalized k-anonymity:Architecture and algorithms[J].IEEE Transactions on Mobile Computing,2008,7(1):1-18.
[11]Xu Jianliang,Tang Xueyan,Hu Haibo,et al.Privacy-conscious location-based queries in mobile environments[J].IEEE Transactions on Parallel and Distributed Systems,2009,21(3):313-326.
[12]Solanas A,Martínez-Ballesté A.Privacy protection in location-based services through a public-key privacy homomorphism[J].Public Key Infrastructure,2007,4582:362-368.
[13]Solanas A,Martínez-Ballesté A.A TTP-free protocol for location privacy in location-based services[J].Computer Communications,2008,31(6):1181-1191.
[14]Zhu Xiaoling,Lu Yang,Zhu Xiaojuan,et al.A location privacy-preserving protocol based on homomorphic encryption and key agreement[C]//2013 International Conference on Information Science and Cloud Computing Companion.Guangzhou:IEEE,2013:54-59.
[15]Zhu Xiaoling,Hu Donghui,Hou Zhengfeng,et al.A location privacy preserving solution to resist passive and active attacks in VANET[J].Communications,2014,11(9):60-67.
[16]Krunal N C,Deshmukha H R.Mobile Ad-Hoc wireless network[J].International Journal of Computer Science and Information Technologies,2012,3(2):3782-3786.
[17]Goldwasser S.Multi party computations:Past and present[C]//16th Annual ACM Symposium on Principles of Distributed Computing.New York,USA:ACM,1997:1-6.
[18]Du Wenliang,Zhan Zhijun.A practical approach to solve secure multi-party computation problems[C]//Proceedings of the 2002 Workshop on New Security Paradigms(NSPW'02).New York,NY,USA:ACM,2002:127-135.
[19]Yao A C.Protocols for secure computations[C]//Proceedings of the 23rd Annual Symposium on Foundations of Computer Science.Washington,DC,USA:IEEE Computer Society,1982:160-164.
[20]Clifto C.Tools for privacy preserving distributed data mining[J].SIGKDD Explorations,2003,4(2):28-34.
[21]Gennaro R,Micali S.Verifiable secret sharing as secure computation[J].Lecture Notes in Computer Science,2001,921:168-182.
[22]Backes M,Kate A,Patra A.Computational verifiable secret sharing revisited[J].Lecture Notes in Computer Science,2011,7073:590-609.
[23]Peng Kun.Efficient VSS free of computational assumption[J].Journal of Parallel and Distributed Computing,2011,71(12):1592-1597.
[25]WIKIPEADI.Lagrange polynomial[EB/OL].http://en.wikipedia.org/wiki/Lagrange_polynomial,2015-03-30.


Last Update: 2016-06-30