Homomorphic encryption-based position privacy querying method

A technology of homomorphic encryption and query method, which is applied in homomorphic encryption communication, secure communication device, and key distribution, which can solve the problems of mobile user privacy leakage, lower query accuracy, and user information leakage, so as to protect location privacy and reduce Computational overhead, the effect of improving security

Active Publication Date: 2018-03-02
安徽迪科数金科技有限公司
View PDF5 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) Pseudonym anonymity refers to hiding the real location of the real user through the location of a pseudonym user. The accuracy of the query is determined by the distance between the location of the pseudonym user and the location of the real user, which will reduce the accuracy of the query. It may also cause leakage of user information
[0005] (2) Location k anonymity mainly means that there are at least k users in a certain location area, and these k users cannot be distinguished by identity. Accurately identify real users
[0008] 1. In the existing location privacy protection, the location sent by the mobile user to the data service provider is a certain area, which increases the communication overhead
[0009] 2. The introduction of a third party to generate and manage keys in the existing location privacy protection may cause some privacy leaks of mobile users
[0010] 3. In the existing location privacy protection, data providers need to store a large amount of data
[0011] 4. In the existing location privacy, mobile users will not send the precise value of their location to the data service provider, which will reduce the accuracy of the query

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Homomorphic encryption-based position privacy querying method
  • Homomorphic encryption-based position privacy querying method
  • Homomorphic encryption-based position privacy querying method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The technical solutions of the present invention will be described in detail below, but the protection scope of the present invention is not limited to the examples.

[0034] In this example, if figure 1 As shown, a location privacy query method based on homomorphic encryption is applied to a mobile Internet network environment composed of several mobile users, a data service provider and a cloud server. The specific entity model is as follows: figure 1 Shown: ① mobile user U. Make a service request to the data service provider according to your location; ②Data service provider SP. The data owner is responsible for receiving the service request of the mobile user U and responding accordingly, and the institution is semi-trusted. ③Cloud server CS. The data service provider SP can store the data on the CS by means of payment, and the ciphertext stored on the cloud server CS is completely public, and the institution is semi-trusted. The location privacy protection meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A homomorphic encryption-based position privacy querying method disclosed by the present invention comprises a cloud server, a data service provider and a plurality of mobile users. The data service provider SP partitions the areas in a map according to the intensity of the querying objects, then encrypts the querying objects in the partitions via a symmetric encryption algorithm, and encrypts thesymmetric secret keys via a homomorphic encryption algorithm, and finally stores all ciphertexts in the cloud server, thereby secretly saving the private keys of the homomorphic encryption. Users download the ciphertexts of the querying objects and the corresponding symmetric secret key ciphertexts from the cloud server according to the own positions, and further carry out the blind processing onthe symmetric secret key ciphertexts and transmit to the data service provider, and the data service provider transmits the decrypted blind plaintexts to the users, and finally, users decrypt the corresponding querying objects to obtain the final query results. According to the present invention, the position information of the users is not leaked during the whole process, thereby protecting theposition privacy.

Description

technical field [0001] The invention relates to the technical field of data encryption and location privacy protection, in particular to a query method suitable for protecting the location privacy of mobile users in a mobile internet network. Background technique [0002] In the application of the mobile Internet, location-based services have brought great convenience to people's life and work, but at the same time may cause the leakage of mobile user location information, thus bringing huge security risks. Therefore, with the wide application of LBS, the protection of mobile user privacy is essential. [0003] At present, the commonly used location privacy protection methods include pseudonym anonymity, location k anonymity, spatial anonymity and so on. [0004] (1) Pseudonym anonymity refers to hiding the real location of the real user through the location of a pseudonym user. The accuracy of the query is determined by the distance between the location of the pseudonym us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/00H04L9/08
CPCH04L9/008H04L9/0822H04L9/0861H04L9/0869H04L63/0428H04L63/0435H04L63/06H04L63/062H04L67/1097H04L67/52
Inventor 石润华王圣兰李莉王晴张顺
Owner 安徽迪科数金科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products