论文标题
具有可调性的绩效权衡的安全基于位置的警报系统
A Secure Location-based Alert System with Tunable Privacy-Performance Trade-off
论文作者
论文摘要
监视移动用户的位置更新在许多领域都有重要的应用程序,从公共安全和国家安全到社交网络和广告。但是,敏感信息可以从运动模式中得出,因此保护移动用户的隐私是一个主要问题。用户可能只愿意在满足某种条件时披露其位置,例如,距离灾区或感兴趣的事件相邻。当前,可以使用可搜索的加密来实现此类功能。这样的加密原语为隐私提供了可证明的保证,并且只有在位置满足某些谓词时才允许解密。但是,他们依靠昂贵的基于配对的密码学(PBC),其中直接应用到位置更新的领域导致不切实际的解决方案。我们提出了安全有效的技术,用于私人处理位置更新,以补充PBC的使用,并通过减少所需的配对操作的数量,从而带来显着的性能。我们实施了两个进一步提高绩效的优化:将结果实现到昂贵的数学操作和并行化。我们还提出了一种启发式,该启发式方法通过以小因素(以系统参数为代表)扩大警报区域,从而降低计算开销,从而将少量且受控的隐私量以获得显着的性能增长。广泛的实验结果表明,与基线相比,提出的技术显着提高了性能,并将可搜索的加密开销降低到具有合理资源(例如云)的计算环境中实用的水平。
Monitoring location updates from mobile users has important applications in many areas, ranging from public safety and national security to social networks and advertising. However, sensitive information can be derived from movement patterns, thus protecting the privacy of mobile users is a major concern. Users may only be willing to disclose their locations when some condition is met, for instance in proximity of a disaster area or an event of interest. Currently, such functionality can be achieved using searchable encryption. Such cryptographic primitives provide provable guarantees for privacy, and allow decryption only when the location satisfies some predicate. Nevertheless, they rely on expensive pairing-based cryptography (PBC), of which direct application to the domain of location updates leads to impractical solutions. We propose secure and efficient techniques for private processing of location updates that complement the use of PBC and lead to significant gains in performance by reducing the amount of required pairing operations. We implement two optimizations that further improve performance: materialization of results to expensive mathematical operations, and parallelization. We also propose an heuristic that brings down the computational overhead through enlarging an alert zone by a small factor (given as system parameter), therefore trading off a small and controlled amount of privacy for significant performance gains. Extensive experimental results show that the proposed techniques significantly improve performance compared to the baseline, and reduce the searchable encryption overhead to a level that is practical in a computing environment with reasonable resources, such as the cloud.