Skip to main content

Network Location Privacy Protection with Multi-access Edge Computing

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 926))

Abstract

Real world incidents show leaking of communication and location privacy can lead to serious consequence. Many research efforts have tried to anonymize individual user from aggregated location data. However, just the communication between the mobile user and their peers could reveal important privacy of the mobile user, such as location history. In this paper, we proposed a scalable system built with Multi-access Edge (MEC) that can hide the mobile user’s network location and traffic from communication peers. This system creates a dynamic distributed proxy network for each mobile user to minimize performance overhead and operation cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmed, A., Ahmed, E.: A survey on mobile edge computing. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1–8, January 2016

    Google Scholar 

  2. Barolli, L., Honma, Y., Koyama, A., Durresi, A., Arai, J.: A selective border-casting zone routing protocol for ad-hoc networks. In: 2004 Proceedings of the 15th International Workshop on Database and Expert Systems Applications, pp. 326–330 (2004)

    Google Scholar 

  3. Beck, M.T., Werner, M., Feld, S., Schimper, T.: Mobile edge computing: a taxonomy (2015)

    Google Scholar 

  4. Boutsis, I., Kalogeraki, V.: Location privacy for crowdsourcing applications. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2016, pp. 694–705. ACM, New York (2016)

    Google Scholar 

  5. Damiani, M.L.: Privacy enhancing techniques for the protection of mobility patterns in LBS: research issues and trends. In: European Data Protection: Coming of Age, pp. 223–239. Springer, Dordrecht (2013)

    Google Scholar 

  6. de Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3 (2013). Article number 1376

    Google Scholar 

  7. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)

    Google Scholar 

  8. Durresi, M., Durresi, A., Barolli, L.: Sensor inter-vehicle communication for safer highways. In: 19th International Conference on Advanced Information Networking and Applications, AINA 2005, vol. 2, pp. 599–604 (2005)

    Google Scholar 

  9. ETSI: Multi-access edge computing

    Google Scholar 

  10. Garvelink, B.: Mobile edge computing: a building block for 5G (2015)

    Google Scholar 

  11. Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)

    Article  Google Scholar 

  12. Harold Owens, I.I., Durresi, A.: Video over software-defined networking (VSDN). Comput. Netw. 92, 341–356 (2015)

    Article  Google Scholar 

  13. Laganier, J., Koponen, T., Eggert, L.: Host identity protocol (HIP) registration extension. RFC 5203 (experimental), April 2008

    Google Scholar 

  14. Ma, C.Y.T., Yau, D.K.Y., Yip, N.K., Rao, N.S.V.: Privacy vulnerability of published anonymous mobility traces. IEEE/ACM Trans. Netw. 21(3), 720–733 (2013)

    Article  Google Scholar 

  15. Nunna, S., Kousaridas, A., Ibrahim, M., Dillinger, M., Thuemmler, C., Feussner, H., Schneider, A.: Enabling real-time context-aware collaboration through 5G and mobile edge computing. In: 2015 12th International Conference on Information Technology - New Generations, pp. 601–605, April 2015

    Google Scholar 

  16. Primault, V., Mokhtar, S.B., Lauradoux, C., Brunie, L.: Differentially private location privacy in practice. CoRR, abs/1410.7744 (2014)

    Google Scholar 

  17. Roman, R., Lopez, J., Mambo, M.: Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78(Part 2), 680–698 (2018)

    Article  Google Scholar 

  18. Tran, T.X., Hajisami, A., Pandey, P., Pompili, D.: Collaborative mobile edge computing in 5G networks: new paradigms, scenarios, and challenges. IEEE Commun. Mag. 55(4), 54–61 (2017)

    Article  Google Scholar 

  19. Tran, T.X., Pompili, D.: Joint task offloading and resource allocation for multi-server mobile-edge computing networks. CoRR, abs/1705.00704 (2017)

    Google Scholar 

  20. Tsoukaneri, G., Theodorakopoulos, G., Leather, H., Marina, M.K.: On the inference of user paths from anonymized mobility data. In: 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 199–213, March 2016

    Google Scholar 

  21. Wernke, M., Skvortsov, P., Dürr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18(1), 163–175 (2014)

    Article  Google Scholar 

  22. Winick, J., Jamin, S.: Inet-3.0: internet topology generator. Technical report, Department of Electrical Engineering and Computer Science, University of Michigan (2002)

    Google Scholar 

  23. Xie, W., Goyal, M., Hosseini, H., Martocci, J., Bashir, Y., Baccelli, E., Durresi, A.: Routing loops in DAG-based low power and lossy networks. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 888–895 (2010)

    Google Scholar 

  24. Zhang, P., Durresi, A.: Cloud aided internet mobility for privacy protection. In: IEEE International Conference on Communications, ICC 2017, Paris, France, 21–25 May 2017, pp. 1–6 (2017)

    Google Scholar 

  25. Zhang, P., Durresi, A., Jain, R.: Cloud aided internet mobility. In: Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, 9–13 June 2013, pp. 3688–3693 (2013)

    Google Scholar 

  26. Zhang, P., Durresi, M., Durresi, A.: Mobile privacy protection enhanced with multi-access edge computing. In: 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), pp. 724–731 (2018)

    Google Scholar 

  27. Zhang, P., Durresi, M., Durresi, A.: Multi-access edge computing aided mobility for privacy protection in internet of things. Computing 1–14 (2018)

    Google Scholar 

Download references

Acknowledgements

This work was partially supported by the National Science Foundation under Grant No. 1547411.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mimoza Durresi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, P., Durresi, M., Durresi, A. (2020). Network Location Privacy Protection with Multi-access Edge Computing. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_112

Download citation

Publish with us

Policies and ethics