Location-Sensitive Data Sharing in Mobile Cloud Computing

  • Zhiwei ZhangEmail author
  • Yunling Wang
  • Jianfeng Wang
  • Xiaofeng Chen
  • Jianfeng Ma
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 2)


Mobile could computing (MCC) enhances computation and storage capabilities of mobile devices by leveraging services in mobile clouds, and more and more mobile users tend to outsource their data to clouds. According to laws or user demands, some data can only be accessed by users locating at specified regions, which requires location-based access control mechanisms. There are mainly two techniques involved: secure location and location verification. Distance Bounding Protocols (DBP) is a foundation for secure location and location verification, however, existing studies require strict time synchronization which is a difficult problem in itself. In this paper, we propose a novel location verification protocol that can verify a mobile user’s position more accurately and efficiently without time synchronization. Furthermore, we design a secure location-sensitive data sharing scheme based on our location protocol in mobile cloud computing.


Cloud Computing Data User Storage Cloud Data Owner Mobile Cloud 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Brands S., Chaum D.: Distance-Bounding Protocols. In: EUROCRYPT ’93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology, 344-359 (1994)Google Scholar
  2. 2.
    Chandran N., Goyal V., Moriarty R., Ostrovsky R.: Position Based Cryptography. In: International Cryptology Conference on Advances in Cryptology, 391-407 (2009)Google Scholar
  3. 3.
    Gondree M., Peterson Z.N.J.: Geolocation of data in the cloud. In: ACM Conference on Data and Application Security and Privacy, 25-36 (2013)Google Scholar
  4. 4.
    Gungor O., Chen F., Koksal C.E.: Secret Key Generation Via Localization and Mobility. IEEE Transactions on Vehicular Technology 64(6), 2214-2230 (2014)Google Scholar
  5. 5.
    Peterson Z.N.J., Burns R., Herring J., Stubblefield A., Rubin A.D.: Rekeying for Encrypted Deduplication Storage. In: IEEE/IFIP International Conference on Dependable Systems and Networks, (2016)Google Scholar
  6. 6.
    Peterson Z.N.J., Burns R., Herring J., Stubblefield A., Rubin A.D.: Secure Deletion for a Versioning File System. In: FAST ’05 Conference on File and Storage Technologies, 143-154 (2005)Google Scholar
  7. 7.
    Peterson Z.N.J., Gondree M., Beverly R.: A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud. In: Usenix Workshop on Hot Topics in Cloud Computing, (2011)Google Scholar
  8. 8.
    Rivest R.L.: All-or-nothing encryption and the package transform. In: FSE ’97 Proceedings of the 4th International Workshop on Fast Software Encryption, 210-218 (1998)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Zhiwei Zhang
    • 1
    Email author
  • Yunling Wang
    • 1
  • Jianfeng Wang
    • 1
  • Xiaofeng Chen
    • 1
  • Jianfeng Ma
    • 1
  1. 1.State Key Laboratory of Integrated Service NetworksXidian UniversityXi’anChina

Personalised recommendations