Abstract
Real world incidents show leaking of communication and location privacy can lead to serious consequence. Many research efforts have tried to anonymize individual user from aggregated location data. However, just the communication between the mobile user and their peers could reveal important privacy of the mobile user, such as location history. In this paper, we proposed a scalable system built with Multi-access Edge (MEC) that can hide the mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmed, A., Ahmed, E.: A survey on mobile edge computing. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1–8, January 2016
Barolli, L., Honma, Y., Koyama, A., Durresi, A., Arai, J.: A selective border-casting zone routing protocol for ad-hoc networks. In: 2004 Proceedings of the 15th International Workshop on Database and Expert Systems Applications, pp. 326–330 (2004)
Beck, M.T., Werner, M., Feld, S., Schimper, T.: Mobile edge computing: a taxonomy (2015)
Boutsis, I., Kalogeraki, V.: Location privacy for crowdsourcing applications. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016, pp. 694–705. ACM, New York (2016)
Damiani, M.L.: Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends. In: European Data Protection: Coming of Age, pp. 223–239. Springer, Dordrecht (2013)
de Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3 (2013). Article number 1376
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)
Durresi, M., Durresi, A., Barolli, L.: Sensor inter-vehicle communication for safer highways. In: 19th International Conference on Advanced Information Networking and Applications, AINA 2005, vol. 2, pp. 599–604 (2005)
ETSI: Multi-access edge computing
Garvelink, B.: Mobile edge computing: a building block for 5G (2015)
Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)
Harold Owens, I.I., Durresi, A.: Video over software-defined networking (VSDN). Comput. Netw. 92, 341–356 (2015)
Laganier, J., Koponen, T., Eggert, L.: Host identity protocol (HIP) registration extension. RFC 5203 (experimental), April 2008
Ma, C.Y.T., Yau, D.K.Y., Yip, N.K., Rao, N.S.V.: Privacy vulnerability of published anonymous mobility traces. IEEE/ACM Trans. Netw. 21(3), 720–733 (2013)
Nunna, S., Kousaridas, A., Ibrahim, M., Dillinger, M., Thuemmler, C., Feussner, H., Schneider, A.: Enabling real-time context-aware collaboration through 5G and mobile edge computing. In: 2015 12th International Conference on Information Technology - New Generations, pp. 601–605, April 2015
Primault, V., Mokhtar, S.B., Lauradoux, C., Brunie, L.: Differentially private location privacy in practice. CoRR, abs/1410.7744 (2014)
Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78(Part 2), 680–698 (2018)
Tran, T.X., Hajisami, A., Pandey, P., Pompili, D.: Collaborative mobile edge computing in 5G networks: new paradigms, scenarios, and challenges. IEEE Commun. Mag. 55(4), 54–61 (2017)
Tran, T.X., Pompili, D.: Joint task offloading and resource allocation for multi-server mobile-edge computing networks. CoRR, abs/1705.00704 (2017)
Tsoukaneri, G., Theodorakopoulos, G., Leather, H., Marina, M.K.: On the inference of user paths from anonymized mobility data. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 199–213, March 2016
Wernke, M., Skvortsov, P., Dürr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18(1), 163–175 (2014)
Winick, J., Jamin, S.: Inet-3.0: internet topology generator. Technical report, Department of Electrical Engineering and Computer Science, University of Michigan (2002)
Xie, W., Goyal, M., Hosseini, H., Martocci, J., Bashir, Y., Baccelli, E., Durresi, A.: Routing loops in DAG-based low power and lossy networks. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 888–895 (2010)
Zhang, P., Durresi, A.: Cloud aided internet mobility for privacy protection. In: IEEE International Conference on Communications, ICC 2017, Paris, France, 21–25 May 2017, pp. 1–6 (2017)
Zhang, P., Durresi, A., Jain, R.: Cloud aided internet mobility. In: Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, 9–13 June 2013, pp. 3688–3693 (2013)
Zhang, P., Durresi, M., Durresi, A.: Mobile privacy protection enhanced with multi-access edge computing. In: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), pp. 724–731 (2018)
Zhang, P., Durresi, M., Durresi, A.: Multi-access edge computing aided mobility for privacy protection in internet of things. Computing 1–14 (2018)
Acknowledgements
This work was partially supported by the National Science Foundation under Grant No. 1547411.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, P., Durresi, M., Durresi, A. (2020). Network Location Privacy Protection with Multi-access Edge Computing. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_112
Download citation
DOI: https://doi.org/10.1007/978-3-030-15032-7_112
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15031-0
Online ISBN: 978-3-030-15032-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)