智能计算新技术

边缘计算下面向位置隐私保护的中继分流模型

展开
  • 1. 杭州师范大学 阿里巴巴商学院, 杭州 311121;
    2. 南京大学 计算机科学与技术系, 南京 210023

收稿日期: 2020-06-15

  网络出版日期: 2020-10-14

基金资助

国家自然科学基金面上项目(No.61672276);江苏省重点研发计划项目(No.BE2019104)资助

Relay-Assisted Offloading Model for Location Privacy Protection under Edge Computing

Expand
  • 1. Alibaba Business School, Hangzhou Normal University, Hangzhou 311121, China;
    2. Department of Computer Science and Technology, Nanjing University, Nanjing 210023, China

Received date: 2020-06-15

  Online published: 2020-10-14

摘要

随着基于位置服务(location-based services,LBS)的广泛使用,人们越来越关注位置隐私的保护问题.基于假人的位置隐私保护方法通过在真实位置信息中混入多个虚假位置信息,能够有效保护用户位置隐私.然而,传统基于假人的位置隐私保护方案大多部署在云端的远程服务器中,其面临着用户获取结果时延过高的性能瓶颈.针对上述问题,本文将基于假人的位置隐私保护方法迁移到边缘计算环境下进行部署,并针对边缘服务器的服务能力与覆盖范围具有上限的特点,提出了面向位置隐私保护的中继分流模型,实现了其中的分流方法,并在真实数据集中运行了本文所提出的方法.实验结果表明该方法在保证用户位置隐私保护效果的同时,可以降低用户获取结果的时延.

本文引用格式

林文敏, 张松, 刘加邦 . 边缘计算下面向位置隐私保护的中继分流模型[J]. 应用科学学报, 2020 , 38(5) : 724 -741 . DOI: 10.3969/j.issn.0255-8297.2020.05.006

Abstract

With the widespread adoption of location-based services, people pay more and more attention to the issue of location privacy protection. The dummy based location privacy protection method could achieve the goal via mixing fake locations with users; real location. However, most of traditional dummy based location privacy protection methods are deployed in remote cloud servers, which brings performance limitation issue such as long delay for users to obtain computation results. To address this problem, we consider migrating the dummy based location privacy protection method from cloud servers to edge servers. Moreover, in view of the upper limit of service capacity and coverage of edge servers, we propose a relay offloading model for location privacy protection. We implement the offloading method and run our method with a real data set. Experimental results verify that our method can reduce the delay for user to obtain computation results while ensuring the effect of user;s location privacy protection.

参考文献

[1] Hu C, Li W, Cheng X, et al. A secure and verifiable access control scheme for big data storage in clouds[J]. IEEE Transactions on Big data, 2017, 4(3):341-355.
[2] Quattrone A, Naghizade E, Kulik L, et al. Tell me what you want and I will tell others where you have been[C]//Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, Galway, Ireland, 2014:1783-1786.
[3] Iqbal F, Fung B C M, Debbabi M. Mining criminal networks from chat log[C]//2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, Macau, China, 2012, 1:332-337.
[4] Jain R, Jain N, Nayyar A. Security and privacy in social networks:data and structural anonymity[M]//Handbook of Computer Networks and Cyber Security, Springer, 2020:265-293.
[5] Chatzidimitris T, Gavalas D, Kasapakis V, et al. A location history-aware recommender system for smart retail environments[J]. Personal and Ubiquitous Computing, 2020:1-12.
[6] Zhu J, Kim K H, Mohapatra P, et al. An adaptive privacy-preserving scheme for location tracking of a mobile user[C]//2013 IEEE International Conference on Sensing, Communications and Networking (SECON), New Orlean, USA, 2013:140-148.
[7] Shokouhifard M. User privacy risks and protection in WLAN-based indoor positioning[D]. Tampere, Finland:Tampere University of Technology, 2015.
[8] Wang X, Pande A, Zhu J, et al. STAMP:enabling privacy-preserving location proofs for mobile users[J]. IEEE/ACM Transactions on Networking, 2016, 24(6):3276-3289.
[9] Liu H, Li H, Ma J, et al. Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services[C]//IEEE International Conference on Computer Communications (INFOCOM), Atlanta, USA, 2017:1-9.
[10] Pingley A, Zhang N, Fu X, et al. Protection of query privacy for continuous location based services[C]//IEEE International Conference on Computer Communications (INFOCOM), Shanghai, China, 2011:1710-1718.
[11] Shankar P, Ganapathy V, Iftode L. Privately querying location-based services with sybilquery[C]//Proceedings of the 11th International Conference on Ubiquitous Computing, Sydney, Australia, 2009:31-40.
[12] Gong X W, Chen X, Xing K, et al. Personalized location privacy in mobile networks:a social group utility approach[C]//2015 IEEE Conference on Computer Communications (INFOCOM), Hongkong, China, 2015:1008-1016.
[13] Li M, Salinas S, Thaph A, et al. N-CD:a geometric approach to preserving location privacy in location-based services[C]//2013 IEEE Conference on Computer Communications, Turin, Italy, 2013:3012-3020.
[14] Sweeney L. K-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5):557-570.
[15] Baik H, Gruteser M. Protecting location privacy through path confusion[C]//First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM), Athens, Greece, 2005:194-205.
[16] Liu J B, Jiang X T, Zhang S, et al. FADBM:frequency-aware dummy-based method in long-term location privacy protection[C]//IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS), Tianjin, China, 2019:384-391.
[17] Xu X L, Zhang X Y, Gao H H, et al. BeCome:blockchain-enabled computation offloading for IoT in mobile edge computing[J]. IEEE Transactions on Industrial Informatics, 2020(16):4187-4195.
[18] Kido, H, Yanagisawa Y, Satoh T. An anonymous communication technique using dummies for location-based services[C]//International Conference on Pervasive Services, Santorini, Greece, 2005:88-97.
[19] Lu H, Jensen C S, Yiu M L. PAD:privacy-area aware, dummy-based location privacy in mobile services[C]//Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, Vancouver, Canada, 2008:16-23.
[20] Niu B, Li Q H, Zhu X Y, et al. Achieving k-anonymity in privacy-aware location-based services[C]//IEEE Conference on Computer Communications, Toronto, Canada, 2014:754-762.
[21] Niu B, Li Q H, Zhu X Y, et al. Enhancing privacy through caching in location-based services[C]//IEEE Conference on Computer Communications, Hongkong, China, 2015(26):1017-1025.
[22] Guo S, Xiao B, Yang Y, et al. Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing[C]//Annual IEEE International Conference on Computer Communications, San Francisco, USA, 2016:1-9.
[23] Chen M H, Liang B, Dong M. Joint offloading and resource allocation for computation and communication in mobile cloud with computing access point[C]//IEEE Conference on Co -mputer Communications, Atlanta, GA, 2017:1-9.
[24] Wang Z, Zhong Z D, Zhao D M, et al. Vehicle-based cloudlet relaying for mobile computation offloading[J]. IEEE Transactions on Vehicular Technology, 2018(67):11181-11191.
[25] Hu M, Zhuang L, Wu D, et al. Learning driven computation offloading for asymmetrically informed edge computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2019(30):1802-1815.
[26] Tang W D, Li S, Rafique W, et al. An offloading approach in fog computing environment[C]//IEEE Smart World, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, Guangzhou, China, 2018:857-864.
[27] Zhang H L, Zhang Q, Du X J. Toward vehicle-assisted cloud computing for smartphones[J]. IEEE Transactions on Vehicular Technology, 2015(64):5610-5618.
[28] Josilo S, Dan G. Wireless and computing resource allocation for selfish computation offloading in edge computing[C]//IEEE Conference on Computer Communications, Paris, France, 2019:2467-2475.
[29] Zhang X, Zhu Q X. D2D offloading for statistical QoS provisionings over 5G multimedia mobile wireless networks[C]//IEEE Conference on Computer Communications, Paris, France, 2019:82-90.
[30] Hong Z C, Chen W H, Huang H W, et al. Multi-hop cooperative computation offloading for industrial IoT-edge-cloud computing environments[J]. IEEE Transactions on Parallel and Distributed Systems, 2019(30):2759-2774.
文章导航

/