Facilitating Privacy Conserving Position Proofs for Mobile Users
Keywords:
Location Proof, Privacy, Spatial-Temporal Provenance, Trust.Abstract
With the popularity of social media (e.g., Facebook and Flicker), users can easily share their check-in records and photos during their trips. Location-based services are quickly changing into vastly popular. Additionally to services supported users' current location, several potential services suppose users' location history, or their spatial-temporal provenance. Malicious users could laze their spatial-temporal provenance while not a fastidiously designed security system for users to prove their past locations. In this paper, we present the Spatial-Temporal root age Assurance with Mutual Proofs theme. It is intended for ad-hoc mobile users generating location proofs for every different in a distributed setting. However, it will simply accommodate trusted mobile users and wireless access points. Spatial-Temporal rootage Assurance with Mutual Proofs ensures the integrity and non-transferability of the situation proofs and protects users' privacy. A semi-trusted Certification Authority is used to distribute cryptologic keys moreover as guard users against collusion by a light-weight entropy-based trust analysis approach. Our example implementation on the automaton platform shows that Spatial-Temporal rootage Assurance with Mutual Proofs is affordable in terms of machine and storage resources. Intensive simulation experiments show that our entropy-based trust model is ready to realize high collusion detection accuracy.
References
- S Saroiu and A. Wolman, “Enabling new mobile applications with location proofs,” in Proc. ACM HotMobile, 2009, Art. no. 3.
- W Luo and U. Hengartner, “VeriPlace: A privacy-aware location proof architecture,” in Proc. ACM GIS, 2010, pp. 23–32.
- Z Zhu and G. Cao, “Towards privacy-preserving and colluding-resistance in location proof updating system,” IEEE Trans. Mobile Comput., vol. 12, no. 1, pp. 51–64, Jan. 2011.
- N Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims,” in Proc. ACM WiSe, 2003, pp. 1–10.
- R Hasan and R. Burns, “Where have you been? secure location provenance for mobile devices,” CoRR 2011.
- B Davis, H. Chen, and M. Franklin, “Privacy preserving alibi systems,” in Proc. ACM ASIACCS, 2012, pp. 34–35.
- I Krontiris, F. Freiling, and T. Dimitriou, “Location privacy in urban sensing networks: Research challenges and directions,” IEEE Wireless Commun., vol. 17, no. 5, pp. 30–35, Oct. 2010.
- Y Desmedt, “Major security problems with the ‘unforgeable’ (feige)- fiat-shamir proofs of identity and how to overcome them,” in Proc. SecuriCom, 1988, pp. 15–17.
- L Bussard and W. Bagga, “Distance-bounding proof of knowledge to avoid real-time attacks,” in Security and Privacy in the Age of Ubiquitous Computing. New York, NY, USA: Springer, 2005.
- B. Waters and E. Felten, “Secure, private proofs of location,” Department of Computer Science, Princeton University, Princeton, NJ, USA, Tech. Rep., 2003.
- X. Wang et al., “STAMP: Ad hoc spatial-temporal provenance assurance for mobile users,” in Proc. IEEE ICNP, 2013, pp. 1–10.
- A. Pfitzmann and M. Köhntopp, “Anonymity, unobservability, and pseudonymity-a proposal for terminology,” in Designing Privacy Enhancing Technologies. New York, NY, USA: Springer, 2001.
- Y.-C. Hu, A. Perrig, and D. B. Johnson, “Wormhole attacks in wireless networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 370–380, Feb. 2006.
- S. Halevi and S. Micali, “Practical and provably-secure commitment schemes from collision-free hashing,” in Proc. CRYPTO, 1996, pp. 201–215.
- I. Damgård, “Commitment schemes and zero- knowledge protocols,” in Proc. Lectures Data Security, 1999, pp. 63–86
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.