Facilitating Privacy Conserving Position Proofs for Mobile Users

Authors

  • B. Sreedhar   MCA, Sri Padmavathi College Of Computer Sciences and Technology, Tiruchanoor, Tirupathi, Andhra Pradesh, India

Keywords:

Location Proof, Privacy, Spatial-Temporal Provenance, Trust.

Abstract

With the popularity of social media (e.g., Facebook and Flicker), users can easily share their check-in records and photos during their trips. Location-based services are quickly changing into vastly popular. Additionally to services supported users' current location, several potential services suppose users' location history, or their spatial-temporal provenance. Malicious users could laze their spatial-temporal provenance while not a fastidiously designed security system for users to prove their past locations. In this paper, we present the Spatial-Temporal root age Assurance with Mutual Proofs theme. It is intended for ad-hoc mobile users generating location proofs for every different in a distributed setting. However, it will simply accommodate trusted mobile users and wireless access points. Spatial-Temporal rootage Assurance with Mutual Proofs ensures the integrity and non-transferability of the situation proofs and protects users' privacy. A semi-trusted Certification Authority is used to distribute cryptologic keys moreover as guard users against collusion by a light-weight entropy-based trust analysis approach. Our example implementation on the automaton platform shows that Spatial-Temporal rootage Assurance with Mutual Proofs is affordable in terms of machine and storage resources. Intensive simulation experiments show that our entropy-based trust model is ready to realize high collusion detection accuracy.

References

  1. S Saroiu and A. Wolman, “Enabling new mobile applications with location proofs,” in Proc. ACM HotMobile, 2009, Art. no. 3.
  2. W Luo and U. Hengartner, “VeriPlace: A privacy-aware location proof architecture,” in Proc. ACM GIS, 2010, pp. 23–32.
  3. Z Zhu and G. Cao, “Towards privacy-preserving and colluding-resistance in location proof updating system,” IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 51–64, Jan. 2011.
  4. N Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims,” in Proc. ACM WiSe, 2003, pp. 1–10.
  5. R Hasan and R. Burns, “Where have you been? secure location provenance for mobile devices,” CoRR 2011.
  6. B Davis, H. Chen, and M. Franklin, “Privacy preserving alibi systems,” in Proc. ACM ASIACCS, 2012, pp. 34–35.
  7. I Krontiris, F. Freiling, and T. Dimitriou, “Location privacy in urban sensing networks: Research challenges and directions,” IEEE Wireless Commun., vol. 17, no. 5, pp. 30–35, Oct. 2010.
  8. Y Desmedt, “Major security problems with the ‘unforgeable’ (feige)- fiat-shamir proofs of identity and how to overcome them,” in Proc. SecuriCom, 1988, pp. 15–17.
  9. L Bussard and W. Bagga, “Distance-bounding proof of knowledge to avoid real-time attacks,” in Security and Privacy in the Age of Ubiquitous Computing. New York, NY, USA: Springer, 2005.
  10. B. Waters and E. Felten, “Secure, private proofs of location,” Department of Computer Science, Princeton University, Princeton, NJ, USA, Tech. Rep., 2003.
  11. X. Wang et al., “STAMP: Ad hoc spatial-temporal provenance assurance for mobile users,” in Proc. IEEE ICNP, 2013, pp. 1–10.
  12. A. Pfitzmann and M. Köhntopp, “Anonymity, unobservability, and pseudonymity-a proposal for terminology,” in Designing Privacy Enhancing Technologies. New York, NY, USA: Springer, 2001.
  13. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Wormhole attacks in wireless networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 370–380, Feb. 2006.
  14. S. Halevi and S. Micali, “Practical and provably-secure commitment schemes from collision-free hashing,” in Proc. CRYPTO, 1996, pp. 201–215.
  15. I. Damgård, “Commitment schemes and zero- knowledge protocols,” in Proc. Lectures Data Security, 1999, pp. 63–86

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
B. Sreedhar , " Facilitating Privacy Conserving Position Proofs for Mobile Users, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.1034-1036, March-April-2018.