Skip to main content

2019 | OriginalPaper | Buchkapitel

Privacy Preserving for Location-Based IoT Services

verfasst von : Yue Qiu, Maode Ma

Erschienen in: Smart Grid and Internet of Things

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, the applications of location-based Internet of Things (IoT) services change the way of people’s lives and works. However, these applications may disclose some private location information of users due to lack of privacy protection mechanism, which could result in serious security issues. To protect users’ confidential data, an efficient and secure private proximity testing (ESPT) scheme is designed for location-based IoT services to improve the efficiency while maintaining the privacy of the location of the users. The proposed scheme enables a user to query a service provider whether some people are within a given search range without disclosing any private location information of the user. The security analysis and the simulation results demonstrate that the proposed scheme could not only implement a privacy-preserving proximity test, but also has less computational overheads.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Proceedings of NDSS 2011 (2011) Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Proceedings of NDSS 2011 (2011)
4.
Zurück zum Zitat Saldamli, G., Chow, R., Jin, H., Knijnenburg, B.P.: Private proximity testing with an untrusted server. In: Proceedings of 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2013, WISEC 2013, pp. 113–118. ACM (2013) Saldamli, G., Chow, R., Jin, H., Knijnenburg, B.P.: Private proximity testing with an untrusted server. In: Proceedings of 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks 2013, WISEC 2013, pp. 113–118. ACM (2013)
5.
Zurück zum Zitat Zhuo, G., Jia, Q., Guo, L., Li, M., Fang, Y.: Privacy-preserving verifiable proximity test for location-based services. In: Proceedings of IEEE Global Communications Conference 2015 (GLOBECOM 2015), pp. 1–6. IEEE, USA (2015) Zhuo, G., Jia, Q., Guo, L., Li, M., Fang, Y.: Privacy-preserving verifiable proximity test for location-based services. In: Proceedings of IEEE Global Communications Conference 2015 (GLOBECOM 2015), pp. 1–6. IEEE, USA (2015)
6.
Zurück zum Zitat Novak, E., Li, Q.: Near-PRI: private, proximity based location sharing. In: Proceedings of IEEE INFOCOM 2014, pp. 37–45. IEEE, Canada (2014) Novak, E., Li, Q.: Near-PRI: private, proximity based location sharing. In: Proceedings of IEEE INFOCOM 2014, pp. 37–45. IEEE, Canada (2014)
7.
Zurück zum Zitat Huang, C., Lu, R., Zhu, H., Shao, J., Alamer, A., Lin, X.: EPPD: efficient and privacy-preserving proximity testing with differential privacy techniques. In: Proceedings of IEEE International Conference on Communications 2016 (ICC 2016), pp. 1–6. EEE, Malaysia (2016) Huang, C., Lu, R., Zhu, H., Shao, J., Alamer, A., Lin, X.: EPPD: efficient and privacy-preserving proximity testing with differential privacy techniques. In: Proceedings of IEEE International Conference on Communications 2016 (ICC 2016), pp. 1–6. EEE, Malaysia (2016)
9.
Zurück zum Zitat Zheng, Y., Li, M., Lou, W., Hou, Y.T.: Location based handshake and private proximity test with location tags. IEEE Trans. Dependable Secure Comput. 14(4), 406–419 (2017)CrossRef Zheng, Y., Li, M., Lou, W., Hou, Y.T.: Location based handshake and private proximity test with location tags. IEEE Trans. Dependable Secure Comput. 14(4), 406–419 (2017)CrossRef
10.
Zurück zum Zitat Sedenka, J., Gasti, P.: Privacy-preserving distance computation and proximity testing on earth, done right. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security 2014 (ASIA CCS 2014), pp. 99–110 (2014) Sedenka, J., Gasti, P.: Privacy-preserving distance computation and proximity testing on earth, done right. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security 2014 (ASIA CCS 2014), pp. 99–110 (2014)
11.
Zurück zum Zitat Andr´es, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS 2013), pp. 901–914 (2013) Andr´es, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS 2013), pp. 901–914 (2013)
12.
Zurück zum Zitat Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704–719 (2016) Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704–719 (2016)
13.
Zurück zum Zitat Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4), 46–50 (2014)CrossRef Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4), 46–50 (2014)CrossRef
15.
Zurück zum Zitat Viganò, L.: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theoret. Comput. Sci. 155, 61–86 (2006)CrossRef Viganò, L.: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theoret. Comput. Sci. 155, 61–86 (2006)CrossRef
16.
Metadaten
Titel
Privacy Preserving for Location-Based IoT Services
verfasst von
Yue Qiu
Maode Ma
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-05928-6_4