Journal on Communications ›› 2019, Vol. 40 ›› Issue (4): 83-94.doi: 10.11959/j.issn.1000-436x.2019077

• Papers • Previous Articles     Next Articles

Attribute generalization mix-zone based on multiple secure computation

Bin WANG1,2,Lei ZHANG2(),Guoyin ZHANG1   

  1. 1 College of Computer Science and Technology,Harbin Engineering University,Harbin 150001,China
    2 College of Information and Electronic Technology,Jiamusi University,Jiamusi 154007,China
  • Revised:2019-02-04 Online:2019-04-25 Published:2019-05-05
  • Supported by:
    The Natural Science Foundation of Heilongjiang Province(F2015022);The University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province(UNPYSCT-2017149);The National Undergraduate Innovation and Entrepreneurship Training Program of China(201810222033);Basic Scientific Research Service Fee Project of Heilongjiang Provincial Undergraduate Universities

Abstract:

In order to cope with the problems of resist the attack of user tracking with attributes and resist the disguised attack in road networks,based on the conception of attribute generalization and the methods of homomorphic encryption,a privacy protection method to complete the calculation of attribute generalization in private state and achieve attribute generalization was proposed.The proposed method utilized the homomorphic encryption to achieve secret bidding selection with an agent,and then utilize secure multi-party computation to calculate the similar attributes and achieve the attribute generalization in the end.With the help of fully attribute generalization,this method can solve the problem of users can be tracked by the potential attributes,and at the same time the privacy calculation also does not reveal any information to participants,so this method can prevent the disguised attacker that obtains user’s information in mix-zone.At last,in order to demonstrate the superiority of the proposed method in both of academically and practicality,the security analysis and experimental verification are given,and the procedure of formulation verification and the result of experiment further substantiate the superiorities of the proposed method.

Key words: road network, privacy protection, attribute generalization, homomorphic encryption, secure computation

CLC Number: 

No Suggested Reading articles found!