Location Privacy Protection via Delocalization in 5G Mobile Edge Computing Environment

被引:16
|
作者
Cui, Guangming [1 ]
He, Qiang [1 ]
Chen, Feifei [2 ]
Jin, Hai [3 ]
Xiang, Yang [1 ]
Yang, Yun [1 ]
机构
[1] Swinburne Univ Technol, Dept Comp Technol, Melbourne, Vic 3122, Australia
[2] Deakin Univ, Sch Informat Technol, Geelong, Vic 3125, Australia
[3] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
基金
澳大利亚研究理事会;
关键词
Privacy; Servers; 5G mobile communication; Computer architecture; Edge computing; Buildings; Architecture; Privacy-protecting; delocalization; location-based service; constrained optimization problem; integer programming; K-ANONYMITY;
D O I
10.1109/TSC.2021.3112659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past several years, we have witnessed a variety of mechanisms for protecting mobile users' location privacy, e.g., k-anonymity, cloaking, encryption, etc. Unfortunately, existing techniques suffer from a common limitation - mobile users' locations must be sent to remote cloud servers. In this article, a novel architecture named LBS@E is proposed for building delocalized location-based services (LBSs) in the 5G mobile edge computing (MEC) environment that do not require users' locations. Mobile users can retrieve local information from LBSs deployed on nearby edge servers based on LBS@E. In this way, LBS@E tackles the location privacy problem innovatively by resolving the root cause of the conventional location privacy problem. However, LBS@E raises new challenges to location privacy. A mobile user can still be localized to a particular privacy area co-covered by the edge servers accessed by the mobile user. A small privacy area puts the mobile user's location at the risk of being approximated. In the meantime, the size of the utility area, which determines the amount of local information retrievable for the mobile user, is positively correlated with the number of edge servers accessed by the mobile user. Thus, given a set of accessible edge servers, the mobile user needs to determine which ones to access so that the retrievable local information is maximized and the risk of being localized is minimized. In this article, we model this new location privacy protecting problem formally, analyze its problem hardness and propose an integer programming based approach for finding the optimal solution. Extensive experiments are conducted on a widely-used real-world dataset to evaluate the proposed approach.
引用
收藏
页码:412 / 423
页数:12
相关论文
共 50 条
  • [1] Research on Location Privacy Protection Methods for Mobile Users in 5G Environment
    Jiang, Haiyang
    Zeng, Jianqiu
    Han, Ke
    Liu, Luan
    [J]. Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2021, 41 (01): : 84 - 92
  • [2] Resource Allocation for 5G Network Considering Privacy Protection in Edge Computing Environment
    Wang, Li
    Wang, Xiaokai
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2023, 32 (17)
  • [3] A Multi-Server Authentication Protocol Achieving Privacy Protection and Traceability for 5G Mobile Edge Computing
    Lee, Junho
    Kim, Dongwook
    Park, Jinhyun
    Park, Hyungweon
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [4] A collaborative scheduling strategy for IoV computing resources considering location privacy protection in mobile edge computing environment
    Meiyu Pang
    Li Wang
    Ningsheng Fang
    [J]. Journal of Cloud Computing, 9
  • [5] A collaborative scheduling strategy for IoV computing resources considering location privacy protection in mobile edge computing environment
    Pang, Meiyu
    Wang, Li
    Fang, Ningsheng
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [6] Power Efficient Clustering Scheme for 5G Mobile Edge Computing Environment
    Jaewon Ahn
    Joohyung Lee
    Sangdon Park
    Hong-Shik Park
    [J]. Mobile Networks and Applications, 2019, 24 : 643 - 652
  • [7] Power Efficient Clustering Scheme for 5G Mobile Edge Computing Environment
    Ahn, Jaewon
    Lee, Joohyung
    Park, Sangdon
    Park, Hong-Shik
    [J]. MOBILE NETWORKS & APPLICATIONS, 2019, 24 (02): : 643 - 652
  • [8] THE NEED FOR MOBILE EDGE COMPUTING IN 5G NETWORKS
    Singh, Bhawna
    [J]. Journal of the Institute of Telecommunications Professionals, 2022, 16 : 23 - 30
  • [9] Preserving Location Privacy in Mobile Edge Computing
    Wang, Yuhang
    Tian, Zhihong
    Su, Shen
    Sun, Yanbin
    Zhu, Chunsheng
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [10] Implementation Aspects of Mobile Edge Location Service in 5G
    Atanasov, Ivaylo
    Pencheva, Evelina
    Dimitrova, Emilia
    [J]. 2021 29TH NATIONAL CONFERENCE WITH INTERNATIONAL PARTICIPATION (TELECOM), 2021, : 9 - 12