| Literature DB >> 27897984 |
Qingqing Xie1, Liangmin Wang2.
Abstract
With the wide use of mobile sensing application, more and more location-embedded data are collected and stored in mobile clouds, such as iCloud, Samsung cloud, etc. Using these data, the cloud service provider (CSP) can provide location-based service (LBS) for users. However, the mobile cloud is untrustworthy. The privacy concerns force the sensitive locations to be stored on the mobile cloud in an encrypted form. However, this brings a great challenge to utilize these data to provide efficient LBS. To solve this problem, we propose a privacy-preserving LBS scheme for mobile sensing data, based on the RSA (for Rivest, Shamir and Adleman) algorithm and ciphertext policy attribute-based encryption (CP-ABE) scheme. The mobile cloud can perform location distance computing and comparison efficiently for authorized users, without location privacy leakage. In the end, theoretical security analysis and experimental evaluation demonstrate that our scheme is secure against the chosen plaintext attack (CPA) and efficient enough for practical applications in terms of user side computation overhead.Entities:
Keywords: location-based service; mobile cloud; mobile sensing; privacy preservation
Year: 2016 PMID: 27897984 PMCID: PMC5190974 DOI: 10.3390/s16121993
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1An example in which Alice shares location-embedded data with her friends.
Figure 2An example of the access tree.
The notations for access tree .
| Notation | Description |
|---|---|
| a node in | |
| the set of leaf nodes in | |
| the set of all the child nodes of | |
| the number of the node | |
| the threshold value of node | |
| the polynomial equation of node | |
| the index of node |
Figure 3The mobile sensing service system.
Figure 4The overview of verification process.
Figure 5The time cost in our scheme.
Figure 6The comparison of the total time cost between our scheme and PLQP.
Figure 7The comparison of each entity’s time cost between our scheme and PLQP.
Figure 8The time comparison of performing location distance compute between our scheme and PLQP.
Figure 9The time comparison of performing location distance compare between our scheme and PLQP.
The computation cost comparison.
| Queries | Average Computation | Average Computation | Average Computation | |||
|---|---|---|---|---|---|---|
| Ours | PLQP | Ours | PLQP | Ours | PLQP | |
| Distance Compute | 0 | 0 | ||||
| Distance Compare | 0 | 0 | ||||