PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control

Tao Li, Rui Zhang, Yanchao Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Abstract

With the fast development of mobile Internet, ecommerce has been widely applied to the living of the masses. Because of the strong dependence of e-commerce, logistics industry has attracted much attention. However, when users get convenient service from the logistics industry, their privacy is compromised. Addresses, phone numbers and other private information on the parcel are accessible to anyone. Moreover, because users' logistics data is stored in plaintext in the companies' servers, it is vulnerable to the peep from staffs in the company and even the Hackers. This paper presents the first logistics system, PriExpress, which protects the users' privacy and ensures the efficient delivery of the parcel at the same time. To address the above problem, we improved attribute based encryption with a hidden access tree. Based on users' attributes, we enforce fine-grained access control on the logistic data. Our security and performance analysis shows that PriExpress is both secure and efficient.

Original languageEnglish (US)
Title of host publication2016 IEEE Conference on Communications and Network Security, CNS 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages333-341
Number of pages9
ISBN (Electronic)9781509030651
DOIs
StatePublished - Feb 21 2017
Event2016 IEEE Conference on Communications and Network Security, CNS 2016 - Philadelphia, United States
Duration: Oct 17 2016Oct 19 2016

Other

Other2016 IEEE Conference on Communications and Network Security, CNS 2016
Country/TerritoryUnited States
CityPhiladelphia
Period10/17/1610/19/16

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control'. Together they form a unique fingerprint.

Cite this