Efficient LBS Security-Preserving Based on NTRU Oblivious Transfer
- 40 Downloads
In vehicular environment, Location Based Services (LBS) are widely deployed to provide a service or a piece of information that is related to the location of a driver. Though a series of technologies, such as anonymity, mix zone or private information retrieval, can be exploited to protect the drivers position information, the data proprietorship is always ignored. In addition, since the embedded systems like Onboard Unit are generally recourse-constrained, efficient schemes are urgent for now. In this paper, we presented a novel oblivious transfer protocol based on Number Theory Research Unit Encryption and structured a security LBS scheme in terms of it. Comparing with Jannati and Bahrak’s protocol, it is concluded that our scheme is more efficient and practical.
KeywordsLocation based services Position information Data proprietorship Umber theory research unit encryption Oblivious transfer protocol
The work was supported by National Natural Science Foundation under Grant Nos. 61703063, 61663008, 61573076, 61663008, 61004118; the Scientific Research Foundation for the Returned Overseas Chinese Scholars under Grant 2015-49; the Program for Excellent Talents of Chongqing Higher School under Grant 2014-18; the petrochemical equipment fault diagnosis Key Laboratory in Guangdong Province Foundation under Grant GDUPKLAB201501; the research project for the education of graduate students of Chongqing under Grant yjg152011; Chongqing Association of Higher Education 2015–2016 Research Project under Grant CQGJ15010C; Higher education reform project of Chongqing Municipal Education Commission under Grant 163069; the key research topics of the 13th Five-years plan of Chongqing education science under Grant 2016-GX-040; the Chongqing Natural Science Foundation under Grant CSTC2015jcyjA0540 and CSTC2017jcyjA1665; Science and Technology Research Project of Chongqing Municipal Education Commission of China P.R. under Grant KJ1600518 and KJ1705139.
- 2.Kido, H., Yanagisawa, Y., & Satoh, T. (2005). An anonymous communication technique using dummies for location-based services. In ICPS (pp. 88–97).Google Scholar
- 3.Shankar, P., Ganapathy, V., & Iftode, L. (2009). Privately querying location-based services with sybilquery (pp. 31–40).Google Scholar
- 5.Beresford, A. R., & Stajano, F. (2004). Mix zones: User privacy in location-aware services. In IEEE Conference on Pervasive Computing and Communications Workshops (p. 127).Google Scholar
- 7.Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In International Conference on Mobile Systems, Applications, and Services (pp. 31–42).Google Scholar
- 8.Molina-Gil, J. (2015). Providing k-anonymity and revocation in ubiquitous vanets. Ad Hoc Networks, 36(P2), 482–494.Google Scholar
- 10.Durr, F., Skvortsov, P., & Rothermel, K. (2011). Position sharing for location privacy in non-trusted systems. In IEEE International Conference on Pervasive Computing and Communications (pp. 189–196).Google Scholar
- 11.Skvortsov, P., Drr, F., & Rothermel, K. (2012). Map-aware position sharing for location privacy in non-trusted systems. In International Conference on Pervasive Computing (pp. 388–405).Google Scholar
- 12.Skvortsov, P., Schembera, B., Dürr, F., & Rothermel, K. (2017). Optimized secure position sharing with non-trusted servers. arXiv preprint arXiv:1702.08377.
- 13.Haney, R. D. (2017). Techniques for sharing relative position between mobile devices.Google Scholar
- 15.Mei, Y., Jiang, G., Zhang, W., & Cui, Y. (2014). A collaboratively hidden location privacy scheme for vanets. International Journal of Distributed Sensor Networks, 2014(1), 1–6.Google Scholar
- 17.Fung, E., Kellaris, G., & Papadias, D. (2015). Combining differential privacy and PIR for efficient strong location privacy. Berlin: Springer.Google Scholar
- 19.Hu, P., & Zhu, S. (2016). Poster: Location privacy using homomorphic encryption.Google Scholar
- 21.Jannati, H., & Bahrak, B. (2017). An oblivious transfer protocol based on elgamal encryption for preserving location privacy. Wireless Personal Communications, 3, 1–11.Google Scholar
- 22.Hoffstein, J., Pipher, J., & Silverman, J. H. (1998). Ntru: A ring-based public key cryptosystem. In International Symposium on Algorithmic Number Theory (pp. 267–288).Google Scholar
- 23.Wahab, H. B. A., & Jaber, T. A. (2016). Improve NTRU algorithm based on Chebyshev polynomial. In Information Technology and Computer Applications Congress (pp. 1–5).Google Scholar
- 24.Hoffstein, J., Pipher, J., Schanck, J. M., Silverman, J. H., Whyte, W., & Zhang, Z. (2017). Choosing parameters for NTRUencrypt. In Cryptographers Track at the RSA Conference (pp. 3–18).Google Scholar
- 25.Rabin, M. O. (1981). How to exchange secrets by oblivious transfer. Harvard Aiken Comp. Lab[R]. TR-81Google Scholar
- 27.Ishai, Y., Kilian, J., Nissim, K., & Petrank, E. (2003). Extending oblivious transfers efficiently. Lecture Notes in Computer Science (Vol. 2729, pp. 145–161).Google Scholar