Privacy Protection in 5G Positioning and Location-based Services Based on SGX

Author:

Yan Zheng1ORCID,Qian Xinren2ORCID,Liu Shushu3ORCID,Deng Robert4ORCID

Affiliation:

1. The State Key Lab of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi’an, China and The Department of Communications and Networking, Aalto University, Espoo, Finland

2. The State Key Lab of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi’an, China

3. The Department of Communications and Networking, Aalto University, Espoo, Finland

4. The School of Information Systems, Singapore Management University, Singapore

Abstract

As the sensitivity of position, the privacy protection in both 5G positioning and its further application in location-based services (LBSs) has been paid special attention and studied. Solutions based on k-anonymity, homomorphic encryption, and secure multi-party computation have been proposed. However, these solutions either require a trusted third party or incur heavy overheads. Besides, there still lacks an integrated solution that can protect privacy for both positioning and LBS provision. Based on Intel SGX, this article proposes a novel light-weight scheme that can protect privacy in both 5G positioning and its further applications in LBS provision in an integrated way. Through secret sharing, the proposed scheme can also support multiple location-based service providers without frequent key exchange. We seriously analyze the security of our scheme. Based on scheme implementation, its efficiency is proved through the performance evaluation conducted over a real-world database.

Funder

Academy of Finland

National Natural Science Foundation of China

ZheJiang Lab

Shaanxi Innovation Team Project

111 Project

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications

Reference49 articles.

1. Supporting anonymous location queries in mobile environments with privacygrid

2. Location privacy in pervasive computing

3. Protecting Privacy Against Location-Based Personal Identification

4. Identity-Based Encryption from the Weil Pairing

5. Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software grand exposure: SGX cache attacks are practical. In Proceedings of the 11th USENIX Workshop on Offensive Technologies (WOOT’17).

Cited by 6 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Cross-Chain-Based Trustworthy Node Identity Governance in Internet of Things;IEEE Internet of Things Journal;2023-12-15

2. VeriORouting: Verification on intelligent routing outsourced to the cloud;Information Sciences;2023-07

3. Positioning Information-Based Codebook for Reconfigurable Intelligent Surface Passive Beamforming;IEEE Open Journal of the Communications Society;2023

4. An innovation development of short range communication protocol for a reliable device discovery in 5G communication network;2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC);2022-11-18

5. StreamingTag;Proceedings of the 28th Annual International Conference on Mobile Computing And Networking;2022-10-14

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3