Optimized Secure Position Sharing with Non-trusted Servers

نویسندگان

  • Pavel Skvortsov
  • Björn Schembera
  • Frank Dürr
  • Kurt Rothermel
چکیده

Today, location-based applications and services such as friend finders and geo-social networks are very popular. However, storing private position information on thirdparty location servers leads to privacy problems. In our previous work, we proposed a position sharing approach for secure management of positions on non-trusted servers [1, 2], which distributes position shares of limited precision among servers of several providers. In this paper, we propose two novel contributions to improve the original approach. First, we optimize the placement of shares among servers by taking their trustworthiness into account. Second, we optimize the location update protocols to minimize the number of messages between mobile device and location servers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

Protecting Patient Privacy when Sharing Medical Data

This paper describes a national eHealth platform concept with a multi-level privacy protection in order to improve the security and privacy of medical information on their storage locations as well as during the exchanging/sharing processes. The key idea is to classify and split-up data into different servers. A Trusted Third Party server manages personal identifying data together with the rela...

متن کامل

Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing

Cloud computing is an Internet-based computing. In cloud computing, the service is fully served by the provider. Users need nothing but personal devices and Internet access. Computing services, such as data, storage, software, computing, and application, can be delivered to local devices through Internet. The major security issue of cloud computing is that cloud providers must ensure that their...

متن کامل

Quantum password sharing scheme using trusted servers

Received Nov 23 th , 2012 Accepted Dec 28 th , 2012 The main purpose of the sharing schemes based on trusted servers is to obtain a password. The threshold cryptography aims the secret cryptographic protection, and is based on the distribution of the key on several servers, with the purpose to tolerate the attacks. In this work I will present a quantum version of the password sharing protocol, ...

متن کامل

Spf: Security Performance Flexibility Framework for Trusted Operating Systems

The rapid growth of networking, data sharing, and the Internet has made computer security an important part of computer research and development. A number of highly secure operating systems have been developed to handle the increasing need for security. These operating systems, typically called Trusted Operating Systems, offer a number of security mechanisms that can help protect information, m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1702.08377  شماره 

صفحات  -

تاریخ انتشار 2017