Journal on Communications ›› 2024, Vol. 45 ›› Issue (2): 31-39.doi: 10.11959/j.issn.1000-436x.2024051

• Papers • Previous Articles    

Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing

Yinghui ZHANG1, Sirui ZHANG1, Qiuxia ZHAO2, Xiaokun ZHENG2, Jin CAO3   

  1. 1 School of Cyberspace Security, Xi’an University of Posts &Telecommunications, Xi’an 710121, China
    2 The College of Computer, Qinghai Normal University, Xining 810016, China
    3 School of Cyber Engineering, Xidian University, Xi’an 710126, China
  • Revised:2023-12-29 Online:2024-02-01 Published:2024-02-01
  • Supported by:
    The National Natural Science Foundation of China(62072369);The National Natural Science Foundation of China(62072371);The Youth Innovation Team of Shaanxi Universities;The Shaanxi Special Support Program Youth Top-notch Talent Program;The Key Research and Develop-ment Program of Shaanxi Province(2021ZDLGY06-02);The Key Research and Develop-ment Program of Shaanxi Province(2020ZDLGY08-04);The Technology Innovation Leading Program of Shaanxi Province(2023-YD-CGZH-31)

Abstract:

To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.

Key words: Wi-Fi fingerprint, outsourced computing, cloud service, Paillier encryption

CLC Number: 

No Suggested Reading articles found!