信息网络安全 ›› 2017, Vol. 17 ›› Issue (1): 43-47.doi: 10.3969/j.issn.1671-1122.2017.01.007

• • 上一篇    下一篇

可证明安全的LBS中连续查询的轨迹隐私保护方案

周凯1,2,3, 彭长根2,3(), 何建琼1,2,3,4, 王亚伟1,2,3   

  1. 1.贵州大学计算机科学与技术学院,贵州贵阳550025
    2.贵州省公共大数据重点实验室(贵州大学),贵州贵阳 550025
    3.贵州大学密码学与数据安全研究所,贵州贵阳 550025
    4.贵州省网络数据保密工程技术研究中心,贵州贵阳 550025
  • 收稿日期:2016-11-23 出版日期:2017-01-20 发布日期:2020-05-12
  • 作者简介:

    作者简介: 周凯(1991—),男,浙江,硕士研究生,主要研究方向为密码学与可信计算;彭长根(1963—),男,贵州,教授,博士,主要研究方向为密码学、信息安全等;何建琼(1991—),女,贵州, 硕士研究生,主要研究方向为密码学与安全协议;王亚伟(1990—),男,河南,硕士研究生,主要研究方向为密码学与可信计算。

  • 基金资助:
    国家自然科学基金[61262073, 61662009];贵州省科技基金[黔科合基础[2016]1023];贵州大学研究生创新基金[2016050]

Provable Secure Trajectory Privacy Preserving Scheme for Continuous Queries in Location-based Services

Kai ZHOU1,2,3, Changgen PENG1,2,3(), Jianqiong HE1,2,3,4, Yawei WANG1,2,3   

  1. 1. College of Computer Science and Technology, Guizhou University, Guiyang Guizhou 550025, China
    2.Guizhou Provincial Key Laboratory of Public Big Data (Guizhou University), Guiyang Guizhou 550025, China
    3. Institute of Cryptography & Data Security, Guizhou University, Guiyang Guizhou 550025, China
    4.Guizhou Provincial Engineering and Technology Research Center of Cyber Data Security, Guiyang Guizhou 550025, China
  • Received:2016-11-23 Online:2017-01-20 Published:2020-05-12

摘要:

文章针对LBS中连续查询的轨迹隐私泄露问题,提出了一种可证明安全的轨迹隐私保护方案。首先,基于Silent Cascade隐私保护方案,通过分析LBS中连续查询的轨迹隐私保护的安全需求(即不可区分地发送消息)建立安全模型;其次,运用双线性映射方法构造用户运动中连续查询的轨迹隐私保护方案;最后,从可证明安全角度证明了该保护方案,并与其他方案进行了安全性对比,对比结果表明,文章方案除了满足可证明安全性,且具有高服务质量外,还能抵抗连续查询攻击。

关键词: 基于位置服务, 轨迹隐私, 可证明安全, 隐私保护

Abstract:

This paper proposes a provable secure trajectory privacy preserving scheme to solve the trajectory privacy leakage problem for continuous queries in location-based service. Firstly, the security model is established by analyzing the security requirement, that is indistinguishably sending messages, about the trajectory privacies for continuous queries based on Silent Cascade privacy preserving scheme. Secondly, trajectory privacy preserving scheme for continuous queries in user motion is constructed by using the bilinear mapping. Finally, the scheme is proved from the perspective of provable security, and compared the security with other schemes. The results show that the scheme not only has provable security and high quality of service, but also can resist continuous query attack.

Key words: location-based service, trajectory privacy, provable secure, privacy preserving

中图分类号: