ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider (LBSP). In such a scenario, user privacy becomes a major concern: the knowledge about user location may lead to her identification as well as a continuous tracing of her position. Researchers proposed several approaches to preserve users’ location privacy. They also showed that hiding the location of an LBS user is not enough to guarantee her privacy, i.e., user’s profile attributes or background knowledge of an attacker may reveal the user’s identity. In this paper we propose ABAKA, a novel collaborative approach that provides identity privacy for LBS users considering users’ profile attributes. In particular, our solution guarantees p-sensitive k-anonymity for the user that sends an LBS request to the LBSP. ABAKA computes a cloaked area by collaborative multi-hop forwarding of the LBS query, and using Ciphertext-Policy Attribute-Based Encryption (CP-ABE). We ran a thorough set of experiments to evaluate our solution: the results confirm the feasibility and efficiency of our proposal.
7. Conclusions
Location and identity privacy in Location-Based Services are major concerns for users who want to protect their privacy from a malicious LBSP, as well as from an eavesdropper. While several so- lutions for guaranteeing privacy in LBSs have been proposed in the literature, they are often centralized, or do not take into account the prior knowledge of the attacker about user profiles. In this pa- per we present ABAKA, our collaborative solution that guarantees k-anonymity, as well as p-sensitivity in LBSs, taking into account the issued query semantics. In our approach, users have a set of attributes associated to their profile. Their attributes are bound to a CP-ABE private key. An LBS message is first processed by the is- suer, and then forwarded through a multi-hop route to the LBSP. ABAKA enables each issuer to delimit a cloaked area within which she wants to be anonymous, and to specify a list of k − 1 poli- cies, i.e., attribute combinations, that users in the multi-hop path must satisfy in order to forward the query message to the LBSP. ABAKA provides the possibility of performing a trade-off between the stringency of privacy protection and quality of service for the issuer in her current location, based on the query semantics. We addressed the threat of active and passive adversaries by means of CP-ABE and multi-hop routing approaches. We simulated our pro- tocol on synthetic datasets derived from real population statistics (considering two cities: New York (USA), and Milan (Italy)), and demonstrated that our approach is feasible and efficient.