Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    Active Oblivious Transfer-Based Location Privacy Preservation Crowdsensing Scheme

    As a special type of location-based service (LBS), crowdsensing becomes more prosperous in people’s daily life. However, during the process of task distribution, the publisher’s and workers’ locations will be revealed to each other, and then their personal privacy is violated. So in this paper, in order to cope with the violation of location privacy in crowdsensing and provide privacy preservation service for both entities, an active oblivious transfer-based location privacy preservation crowdsensing scheme (short for AOTC) has been proposed. In this scheme, the oblivious transfer is used to encrypt the range of sensing grid of workers, and then matching sensing grids with the sensing region of the publisher without decryption. During the whole process, the process of location matching and results sending is disposed of by the entity of workers actively, so does not establish any data aggregation that can be used as the point of attack. As a result, the AOTC can guarantee the personal privacy of both entities in crowdsensing cannot be obtained by each other, and guarantee other workers also difficult to obtain the precise location of any workers. In addition, as workers send the sensing result to the publisher actively this scheme can also increase the probability of workers’ participation potentially. At last, the theoretical privacy preservation ability of AOTC is analyzed in the section on security analysis with three types of privacy threats. Then the performance of AOTC is compared with other similar schemes in both privacy preservation and execution efficiency, so in simulation experiments, comparison results with brief analyses will confirm that the AOTC has achieved the desired effect and will further demonstrate the superiority.

  • chapterNo Access

    Research on Cloud-Based LBS and Location Privacy Protection

    Location-based services have already been widely used in many different areas. With the popularization of intelligent terminals, providing mobile internet services on the cloud have enormous commercial prospects. However, the high adhesion degree of mobile terminals to users not only brings facility but also results in the risk of privacy leak. The paper emphasized the necessity and advantages to provide mobile internet services based on cloud computing technology, analyzed the security issues of location privacy to LBS system brought by mobile cloud computing, and proposed the framework and implement method of LBS system under mobile cloud computing environment.