Towards privacy-preserving RFID-based location-based services

Nowadays, RFID technology is increasingly become popular and begin to enter many spheres of everyday life. In this paper, we present LocSafe, a “missed-connections” service with privacy grantees based on RFID technology, in order to prove an encounter sharing among users in the past. LocSafe is comprised of three parts: RFID Tags, LE Collectors, and Social Service Provider. We use RFID technology to detect encounters, and use attribute-based encryption and broadcast encryption to establish trust and protect users' privacy. We evaluate LocSafe by an study of “missed-connections” problems and analysis of system implementation.

[1]  Beth Gylys,et al.  I Saw You , 2001 .

[2]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[3]  Matthias Kabatnik,et al.  Towards Privacy Support in a Global Location Service , 2001 .

[4]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[5]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[6]  Marco Gruteser,et al.  USENIX Association , 1992 .

[7]  Justin Manweiler,et al.  SMILE: encounter-based trust for mobile social services , 2009, CCS.

[8]  Ahmed Helmy,et al.  Proximity based trust-advisor using encounters for mobile societies: Analysis of four filters , 2010, Wirel. Commun. Mob. Comput..

[9]  Brent Waters,et al.  Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) , 2009, EUROCRYPT.

[10]  Cécile Delerablée,et al.  Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.

[11]  Carl A. Gunter,et al.  A Formal Privacy System and Its Application to Location Based Services , 2004, Privacy Enhancing Technologies.

[12]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[13]  Klaus Finkenzeller,et al.  Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.

[14]  Aziz Mohaisen,et al.  Secure encounter-based social networks: requirements, challenges, and designs , 2010, CCS '10.