4.8 Article

Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 5, 期 4, 页码 2947-2957

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2017.2766701

关键词

Geometric range query; location-based social networking service (LBSNS); privacy-preserving; proximity detection

资金

  1. National Natural Science Foundation of China [61672411, U1401251]
  2. National Key Research and Development Program of China [2017YFB0802201]
  3. Natural Science Basic Research Plan in Shaanxi Province of China [2016JM6007]
  4. China 111 Project [B16037]
  5. Natural Sciences and Engineering Research Discovery [Rgpin 04009]
  6. NBIF Start-Up [Nbif Rif 2017-915012]
  7. URF [Urf Nf-2017-05]
  8. HMF [Hmf 2017 Ys-4]

向作者/读者索取更多资源

With the pervasiveness of location-aware mobile terminals and the popularity of social applications, location-based social networking service (LBSNS) has brought great convenience to people's life. Meanwhile, proximity detection, which makes LBSNS more flexible, has aroused widespread concern. However, the prosperity of LBSNS still faces many severe challenges on account of users' location privacy and data security. In this paper, we propose two efficient and privacy-preserving proximity detection schemes, named arbitrary geometric range query for polygons (AGRQ-P) and arbitrary geometric range query for circles (AGRQ-C), for location-based social applications. With proposed schemes, a user can choose any area on the map, and query whether her/his friends are within the region without divulging the query information to both social application servers and other users, meanwhile, the accurate locations of her/his friends are also confidential for the servers and the query user. Specifically, with algorithms based on ciphertext of geometric range query, users' query and location information is blurred into ciphertext in client, thus no one but the user knows her/his own sensitive information. Detailed security analysis shows that various security threats can be defended. In addition, the proposed schemes are implemented in an IM APP with a real LBS dataset, and extensive simulation results over smart phones further demonstrate that AGRQ-P and AGRQ-C are highly efficient and can be implemented effectively.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据