A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing

被引:37
|
作者
Zhang, Shiwen [1 ]
Hu, Biao [1 ]
Liang, Wei [1 ]
Li, Kuan-Ching [2 ]
Gupta, Brij B. [3 ,4 ,5 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Providence Univ, Dept Comp Sci & Informat Engn, Taichung 43301, Taiwan
[3] Macquarie Univ, Fac Sci & Engn, Macquarie Pk, NSW 2109, Australia
[4] Symbiosis Int Univ, Symbiosis Ctr Informat Technol, Pune 411115, India
[5] Univ Petr & Energy Studies, Ctr Interdisciplinary Res, Dehra Dun 110048, India
基金
中国国家自然科学基金;
关键词
Privacy; Servers; Computer architecture; Task analysis; Edge computing; Costs; Encryption; Caching; dual K-anonymity; edge computing; K-anonymity; location privacy; location-based services; TASK ALLOCATION; USERS;
D O I
10.1109/JIOT.2023.3235707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location-based services have become prevalent and the risk of location privacy leakage increases. Most existing schemes use third-party-based or third-party-free system architectures; the former suffers from a single point of failure (SPOF) and the latter experiences a heavy load on user terminal equipment and higher communication costs. Ensuring location privacy while lowering system overhead becomes a challenge. Many existing schemes fail to leverage the responses from an LBS server; such responses can be cached to answer subsequent queries. As a result, providing users with a relatively comprehensive level of location privacy protection is troublesome. In this article, we propose a caching-based dual K-anonymous (CDKA) location privacy-preserving scheme in edge computing environments. Our scheme employs an edge server to intercedes between a user and LBS the server. We reduce the load on the user device by applying multilevel caching and to protect location privacy through dual anonymity. To ensure the location privacy in our construction, we set mobile clients and edge servers as anonymous. We use caching to lower the communication overhead and enforce the location privacy. The security analysis of our scheme supports its robustness against the edge server and the LBS server privacy offenses. We rely on the computation time, the communication cost, and the cache hit ratio to evaluate our work against existing constructions. The results are twofold: our work possesses a better response rate down to 15-32.6 ms and exhibits lower communication cost requirements down to 6.2-38.9 kB compared to existing works. Our scheme witnesses a higher cache hit ratio of up to 13.6% and 39.1% compared to the literature.
引用
收藏
页码:9768 / 9781
页数:14
相关论文
共 50 条
  • [21] A k-anonymous location privacy protection method of dummy based on geographical semantics
    Zhang, Yong-Bing
    Zhang, Qiu-Yu
    Li, Zong-Yi
    Yan, Yan
    Zhang, Mo-Yi
    International Journal of Network Security, 2019, 21 (06) : 937 - 946
  • [22] Revisiting a Privacy-Preserving Location-based Service Protocol using Edge Computing
    Upadhyaya, Santosh Kumar
    Vivek, Srinivas
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [23] Deniable-Based Privacy-Preserving Authentication Against Location Leakage in Edge Computing
    Zeng, Shengke
    Zhang, Hongjie
    Hao, Fei
    Li, Hongwei
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 1729 - 1738
  • [24] Efficient Algorithms for K-Anonymous Location Privacy in Participatory Sensing
    Khuong Vu
    Zheng, Rong
    Gao, Jie
    2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2399 - 2407
  • [25] A k-anonymous location privacy protection method of dummy based on approximate matching
    Zhang, Yong-Bing
    Zhang, Qiu-Yu
    Li, Zong-Yi
    Duan, Hong-Xiang
    Zhang, Mo-Yi
    Kongzhi yu Juece/Control and Decision, 2020, 35 (01): : 65 - 73
  • [26] A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment br
    Zhang, Yiran
    Geng, Huizheng
    Xu, Yanyan
    Su, Li
    Liu, Fei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (02): : 450 - 470
  • [27] A blockchain-based conditional privacy-preserving authentication scheme for edge computing servicesd
    Wang, Yifan
    Jia, Xiaoying
    Xia, Yongbo
    Khan, Muhammad Khurram
    He, Debiao
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [28] A Novel Edge Computing Offloading and Privacy-preserving Scheme for Energy Internet
    Li, Kunchang
    Han, Xu
    Yang, Yifan
    Wang, Shuhao
    Shi, Runhua
    Li, Jianbin
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 79 - 83
  • [29] A privacy-preserving federated learning scheme with homomorphic encryption and edge computing
    Zhu, Bian
    Niu, Ling
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 118 : 11 - 20
  • [30] A Privacy-Preserving Mechanism Based on Local Differential Privacy in Edge Computing
    Bi, Mengnan
    Wang, Yingjie
    Cai, Zhipeng
    Tong, Xiangrong
    CHINA COMMUNICATIONS, 2020, 17 (09) : 50 - 65