LBS Hybrid Encryption Scheme Based on IMSI Pseudonym

Article Preview

Abstract:

A hybrid encryption scheme based on the IMSI pseudonym is proposed in this paper. The security model of the scheme is deployed in a cloud environment, and the IMSI pseudonym as a unique identity of a user in the transmission and storage process, which marks and identifies the user, to ensure the privacy of his identity information. Hybrid encryption scheme between communicating parties can be achieved by combining the public-private key pairs updated frequently and symmetric key related to the user identity information, which fully considers the privacy information on security of storage and wireless network transmission and effectively alleviates the current LBS security risks.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

174-180

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] R.P. Minch, Privacy Issues in Location-Aware Mobile Devices, Processing of Hawaii International Conference on System Sciences, January (2004), p.1–10.

DOI: 10.1109/hicss.2004.1265320

Google Scholar

[2] M. Duckham and L. Kulik, Location privacy and location-aware computing, in: J. Drummond, R. Billen, D. Forrest, and E. Joao (Eds. ), Investigating Change in Space and Time, CRC Press, (2006).

Google Scholar

[3] Y.J. Chen, L.C. Wang, A security framework of group location-based mobile applications in cloud computing, International Conference on Parallel Processing Workshops. Taipei: International Association of Computing and Communication. (2011).

DOI: 10.1109/icppw.2011.6

Google Scholar

[4] Y.T. Li, L.C. Wang, R.H. Gao. Implementation issues of location-based group scheduling for cloud applications. IEEE VTS Asia Pacific Wireless Communications Symposium Conference, TaiWan: IEEE Computer Society. (2010).

Google Scholar

[5] W.J. Lou, K. Ren, Security, privacy and accountability in wireless access networks, IEEE Wireless Communications, 16 (2009).

DOI: 10.1109/mwc.2009.5281259

Google Scholar

[6] Y. Zeng, IMSI Protection Proposal Based on Asymmetric, Key Cryptographic System, Communications Technolgy, 41 (2008) 152-154.

Google Scholar

[7] D. Borthakur, The hadoop distributed file system: Architecture and design, on http: /hadoop. apache. org.

Google Scholar