1. A novel location and time privacy-preserving approach for mobile cloud based on blockchain.
- Author
-
Merdassi, Imen, Ghazel, Cherif, and Saidane, Leila
- Abstract
Location-based services (LBSs) rely on geographic information to offer location-based functionality to users, providing comfort to people’s lives but also being accompanied by privacy leaks. Many of the central verification methods proposed in recent years are not satisfactory, as they pose a significant risk to the user’s privacy. Blockchain technology provides a decentralized, distributed and manipulative solution, providing innovation in data sharing and management, as the technology is employed to enhance data privacy protection through various mechanisms, such as hashing and encryption secure transactions and protect user identities. In this paper, we propose a blockchain-based approach to secure location and time data privacy. We present a novel access control system that leverages location-based policies and multi-authority attributes. This approach allows users to remain anonymous while granting access based on their dynamic location and time. By combining multiple private chains, users’ transaction records can be distributed, which can provide users with stronger on-site privacy protection without affecting service quality. Comparative simulation analysis with state-of-the-art methods using benchmark performance metrics shows that our proposed approach provides improved security, efficiency, and transparency. We use the real or random (ROR) model to verify the security of session keys and mutual authentication of the proposed approach. Finally, theoretical security analysis and informal and formal security verifications show that our approach is secure against multiple attacks. We use the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to simulate the resistance of the proposed approach to security attacks. Our evaluation is based on the use of the JPBC (Java Pairing-Based Cryptography) library. Furthermore, validation and performance discussion show that decrypting our approach is preferable. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF