Privacy considerations for cloud-based positioning

作者: Shih-Hau Fang , Wei-Chia Lai , Chih-Ming Lee

DOI: 10.1109/ITST.2012.6425235

关键词:

摘要: Cloud-based positioning provides better support for resource-constrained mobile devices; however, the user's location information is exposed during when computation performed on cloud. The improper exposure of could result in severe consequences that make users target fraudulent attacks. This study proposes a privacy-preserving localization scheme based homomorphic encryption techniques order to protect user privacy from both imminent attackers and untrusted cloud servers. proposed algorithm exposes unreliable only an encrypted version measurements allows be domain. prevents servers understanding computed results avoid adversary monitoring transmission log behavior. On-site experiments show feasibility our approach. domain would not affect accuracy. Experimental also requires less computational overhead achieves higher level simultaneously compared traditional approaches.

参考文章(20)
Jibang Liu, Yung-Hsiang Lu, None, Energy savings in privacy-preserving computation offloading with protection by homomorphic encryption international conference on power aware computing and systems. pp. 1- 7 ,(2010)
A. Rabbachin, A. Conti, M. Z. Win, Intentional Network Interference for Denial of Wireless Eavesdropping global communications conference. pp. 1- 6 ,(2011) , 10.1109/GLOCOM.2011.6134361
A. Cichocki, R. Unbehauen, Simplified neural networks for solving linear least squares and total least squares problems in real time IEEE Transactions on Neural Networks. ,vol. 5, pp. 910- 923 ,(1994) , 10.1109/72.329687
Junqiu Feng, Peiran Wen, Jinbo Liu, Hui Li, Elastic stream cloud (ESC): A stream-oriented cloud computing platform for Rich Internet Application international conference on high performance computing and simulation. pp. 203- 208 ,(2010) , 10.1109/HPCS.2010.5547135
Ping Zhu, Guangli Xiang, The Protection Methods for Mobile Code Based on Homomorphic Encryption and Data Confusion international conference on management of e-commerce and e-government. pp. 256- 260 ,(2011) , 10.1109/ICMECG.2011.48
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Jemin Lee, Hyundong Shin, Moe Z. Win, Secure node packing of large-scale wireless networks international conference on communications. pp. 815- 819 ,(2012) , 10.1109/ICC.2012.6364372
Wenyan Zhang, Ximing Cui, Dengfeng Li, Debao Yuan, Mengru Wang, None, The location privacy protection research in location-based service international conference on geoinformatics. pp. 1- 4 ,(2010) , 10.1109/GEOINFORMATICS.2010.5568118
Alberto Rabbachin, Andrea Conti, Moe Z. Win, The role of aggregate interference on intrinsic network secrecy international conference on communications. pp. 3548- 3553 ,(2012) , 10.1109/ICC.2012.6364388
Jie Yang, Yingying Chen, Victor B. Lawrence, Venkataraman Swaminathan, Robust wireless localization to attacks on access points ieee sarnoff symposium. pp. 208- 212 ,(2009) , 10.1109/SARNOF.2009.4850372