Abstract
In location-based service (LBS), private information retrieval (PIR) is an efficient strategy used for preserving personal privacy. However, schemes with traditional strategy that constructed by information indexing are usually denounced by its processing time and ineffective in preserving the attribute privacy of the user. Thus, in order to cope with above two weaknesses, in this paper, based on the conception of ciphertext policy attribute-based encryption (CP-ABE), a PIR scheme based on CP-ABE is proposed for preserving the personal privacy in LBS (location privacy preservation scheme with CP-ABE based PIR, short for LPPCAP). In this scheme, query and feedback are encrypted with security two-parties calculation by the user and the LBS server, so as not to violate any personal privacy and decrease the processing time in encrypting the retrieved information. In addition, this scheme can also preserve the attribute privacy of users such as the query frequency as well as the moving manner. At last, we analyzed the availability and the privacy of the proposed scheme, and then several groups of comparison experiment are given, so that the effectiveness and the usability of proposed scheme can be verified theoretically, practically, and the quality of service is also preserved.
Funder
Basic Scientifics Research Operating Expenses of Heilongjiang Provincial University and Colleges
Publisher
Public Library of Science (PLoS)
Reference39 articles.
1. Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey;J.W. Kim;Journal of Network and Computer Applications,2022
2. A survey of application research based on blockchain smart contract;S.-Y. Lin;Wireless Networks,2022
3. A Location Privacy Protection Algorithm Based on Double K-Anonymity in the Social Internet of Vehicles;L. Xing;Ieee Communications Letters,2021
4. Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks;B. Niu;Ieee Transactions on Mobile Computing,2022
5. Location privacy: going beyond K-anonymity, cloaking and anonymizers;A. Khoshgozaran;Knowledge and Information Systems,2011