资源描述:
《CONSUMER COMMUNICATIONS AND NETWORKING SERIES The Quest for Personal Control over Mobile Lo》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、CONSUMERCOMMUNICATIONSANDNETWORKINGSERIESTheQuestforPersonalControloverMobileLocationPrivacyQiHe,CarnegieMellonUniversityDapengWu,UniversityofFloridaPradeepKhosla,CarnegieMellonUniversityABSTRACTourlifemoreconvenient,butitcouldalsopro-videcriminalswi
2、thpowerfulweaponstocom-Howtoprotectlocationprivacyofmobilepromisetheprivacyofmobileusers.Computerusersisanimportantissueinubiquitouscomput-scientistshaverealizedthatunlesstheuseofthising.However,locationprivacyprotectionispar-informationisstrictlycon
3、trolled,itcanbeputtoticularlychallenging:ononehand,theavarietyofunsavoryuses[1,2].administrationrequiresalllegitimateuserstoToaddressthelocationprivacyissue,anprovideidentityinformationinordertograntarchitectureforlocationprivacycontrol[2]wasthemperm
4、issiontouseitswirelessservice;ondesignedandexperimentedontheWirelessAn-theotherhand,mobileuserswouldprefernottodrewnetwork,anIEEE802.11wirelesslocalexposeanyinformationthatcouldenableany-areanetwork(WLAN)thatcoverstheentireone,includingtheadministrat
5、ion,togetsomecampusofCarnegieMellonUniversity.Theclueregardingtheirwhereabouts;mobileusersarchitectureimplementedin[2]isillustratedinwouldliketohavecompletepersonalcontrolofFig.1.Underthearchitecture,thereisacentral-theirlocationprivacy.Toaddressthis
6、issue,weizedlocationserverwhereamobileusercanreg-proposeanauthorized-anonymous-ID-basedisterandsubmitherlocationinformationalongscheme;thisschemeeffectivelyeliminatesthewithherpermissionrulesetregardingherprivacyneedforatrustedserveroradministration,
7、whichpreferences.Otherscansendqueriestotheserv-isassumedinthepreviouswork.Ourkeyweaponerforlocationinformationaboutmobileusersisacryptographictechniquecalledblindsigna-whoselocationinformationisstoredintheserv-ture,whichisusedtogenerateanauthorizeder
8、.TheserverprocessesthequeryaccordingtoanonymousIDthatreplacestherealIDofanthequerieduser’spreferencespecifiedwithinauthorizedmobiledevice.Withauthorizedthesetofrules,andthentheservermayreturnanonymousIDs,wedesignanarchitecturecapa-thequeriedinformati