Location Privacy Protection via Delocalization in 5G Mobile Edge Computing Environment

被引:16
|
作者
Cui, Guangming [1 ]
He, Qiang [1 ]
Chen, Feifei [2 ]
Jin, Hai [3 ]
Xiang, Yang [1 ]
Yang, Yun [1 ]
机构
[1] Swinburne Univ Technol, Dept Comp Technol, Melbourne, Vic 3122, Australia
[2] Deakin Univ, Sch Informat Technol, Geelong, Vic 3125, Australia
[3] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
基金
澳大利亚研究理事会;
关键词
Privacy; Servers; 5G mobile communication; Computer architecture; Edge computing; Buildings; Architecture; Privacy-protecting; delocalization; location-based service; constrained optimization problem; integer programming; K-ANONYMITY;
D O I
10.1109/TSC.2021.3112659
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the past several years, we have witnessed a variety of mechanisms for protecting mobile users' location privacy, e.g., k-anonymity, cloaking, encryption, etc. Unfortunately, existing techniques suffer from a common limitation - mobile users' locations must be sent to remote cloud servers. In this article, a novel architecture named LBS@E is proposed for building delocalized location-based services (LBSs) in the 5G mobile edge computing (MEC) environment that do not require users' locations. Mobile users can retrieve local information from LBSs deployed on nearby edge servers based on LBS@E. In this way, LBS@E tackles the location privacy problem innovatively by resolving the root cause of the conventional location privacy problem. However, LBS@E raises new challenges to location privacy. A mobile user can still be localized to a particular privacy area co-covered by the edge servers accessed by the mobile user. A small privacy area puts the mobile user's location at the risk of being approximated. In the meantime, the size of the utility area, which determines the amount of local information retrievable for the mobile user, is positively correlated with the number of edge servers accessed by the mobile user. Thus, given a set of accessible edge servers, the mobile user needs to determine which ones to access so that the retrievable local information is maximized and the risk of being localized is minimized. In this article, we model this new location privacy protecting problem formally, analyze its problem hardness and propose an integer programming based approach for finding the optimal solution. Extensive experiments are conducted on a widely-used real-world dataset to evaluate the proposed approach.
引用
收藏
页码:412 / 423
页数:12
相关论文
共 50 条
  • [41] Edge Caching and Computing in 5G for Mobile AR/VR and Tactile Internet
    Sukhmani, Sukhmani
    Sadeghi, Mohammad
    Erol-Kantarci, Melike
    El Saddik, Abdulmotaleb
    [J]. IEEE MULTIMEDIA, 2019, 26 (01) : 21 - 30
  • [42] Mobile Edge Computing Empowered Energy Efficient Task Offloading in 5G
    Yang, Lichao
    Zhang, Heli
    Li, Ming
    Guo, Jun
    Ji, Hong
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (07) : 6398 - 6409
  • [43] Time-Constrained Service Handoff for Mobile Edge Computing in 5G
    Sharghivand, Nafiseh
    Mashayekhy, Lena
    Ma, Weibin
    Dustdar, Schahram
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 2241 - 2253
  • [44] Load-Aware Edge Server Placement for Mobile Edge Computing in 5G Networks
    Xu, Xiaolong
    Xue, Yuan
    Qi, Lianyong
    Zhang, Xuyun
    Wan, Shaohua
    Dou, Wanchun
    Chang, Victor
    [J]. SERVICE-ORIENTED COMPUTING (ICSOC 2019), 2019, 11895 : 494 - 507
  • [45] Mobile Fog Computing by Using SDN/NFV on 5G Edge Nodes
    Sreekanth, G. R.
    Ahmed, S. Ahmed Najat
    Sarac, Marko
    Strumberger, Ivana
    Bacanin, Nebojsa
    Zivkovic, Miodrag
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (02): : 751 - 765
  • [46] Adaptive Rule Engine for Anomaly Detection in 5G Mobile Edge Computing
    Sun, Penz
    Luo, Liang
    Liu, Shangxin
    Wu, Weifeng
    [J]. COMPANION OF THE 2020 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY (QRS-C 2020), 2020, : 690 - 691
  • [47] Guest Editorial: Blockchain and AI Enabled 5G Mobile Edge Computing
    Chang, Elizabeth
    Chan, Kit Yan
    Clark, Ponnie
    Potdar, Vidy
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (11) : 7067 - 7069
  • [48] Efficient Exploitation of Mobile Edge Computing for Virtualized 5G in EPC Architectures
    Cau, Eleonora
    Corici, Marius
    Bellavista, Paolo
    Foschini, Luca
    Carella, Giuseppe
    Edmonds, Andy
    Bohnert, Thomas Michael
    [J]. 2016 4TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2016), 2016, : 100 - 109
  • [49] Saving Energy in Mobile Devices Using Mobile Device Cloudlet in Mobile Edge Computing for 5G
    Sigwele, Tshiamo
    Pillai, Prashant
    Hu, Yim-Fun
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 422 - 428
  • [50] Privacy Protection in 5G Positioning and Location-based Services Based on SGX
    Yan, Zheng
    Qian, Xinren
    Liu, Shushu
    Deng, Robert
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (03)