Protection of mobile location privacy by using blind signature
- 53 Downloads
Location privacy means a user keeps his/her geographical location secret. If location information falls into the wrong hands, an adversary can physically locate a person. To address this privacy issue, Qi et al. (2004a; 2004b) proposed a special and feasible architecture, using blind signature to generate an authorized anonymous ID replacing the real ID of a legitimate mobile user. The original purpose of his architecture was to eliminate the relationship of authorized anonymous ID and real ID. We present an algorithm to break out Qi’s registration and re-confusion protocol, and then propose a new mechanism based on bilinear pairings to protect location privacy. Moreover we show that the administrator or third parity cannot obtain information on the legitimate user’s authorized anonymous ID and real ID in our proposed protocols.
Key wordsMobile computing Location privacy Security techniques and system Blind signature Location-based services
CLC numberTN918 TP301
Unable to display preview. Download preview PDF.
- Beresford, A.R., Stajano, F., 2004. Mix Zones: User Privacy in Location-Aware Services. Proceedings of the Second IEEE Annual Conference, Pervasive Computing and Communications Workshops’04, p.127–131. [doi:10.1109/PERCOMW.2004.1276918]Google Scholar
- Chaum, D., 1982. Blind Signatures for Untraceable Payments. Proceedings of Crypto’82.Google Scholar
- Einar, S., 2001. Concepts for Personal Location Privacy Policies. Proceedings of the ACM Conference on Electronic Commerce (EC’01), p.48–57.Google Scholar
- Fox, S., 2000. The Internet Life Report. Trust and Privacy Online: Why Americans Want to Rewrite the Rules. The Pew Internet & American Life Project, available at: http://www.pewinternet.org/reports/pdfs/PIP_Trust_Privacy_Report.pdf.
- Gedik, B., Ling, L., 2005. Location Privacy in Mobile Systems: A Personalized Anonymization Model. Proceedings of 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), p.620–629. [doi:10.1109/ICDCS.2005.48]Google Scholar
- Gruteser, M., Grunwald, D., 2003. Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. Proceedings of ACM/USENIX International Conference on Mobile Systems, Applications, and Services.Google Scholar
- Gruteser, M., Schelle, G., Jain, A., Han, R., Grunwald, D., 2003. Privacy-Aware Location Sensor Networks. Proceedings of HotOS’03, 9th Workshop on Hot Topics in Operating Systems, USENIX, p.163–168.Google Scholar
- Qi, H., Wu, D., Khosla, P., 2004b. A Mechanism for Personal Control over Mobile Location Privacy. Proceedings of IEEE/ACM First International Workshop on Broadband Wireless Services and Applications, BroadWISE 2004.Google Scholar