Loading…
Location Privacy in Mobile Edge Clouds
In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 2269 |
container_issue | |
container_start_page | 2264 |
container_title | |
container_volume | |
creator | Ting He Ciftcioglu, Ertugrul N. Wang, Shiqiang Chan, Kevin S. |
description | In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood (ML) detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. The efficacy of our solutions is verified through extensive simulations. |
doi_str_mv | 10.1109/ICDCS.2017.39 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_7980180</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7980180</ieee_id><sourcerecordid>7980180</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-a3633891d4d3b0ab5cad4089039077d55e6f46ec3bed00b41b6f0146a4f55f123</originalsourceid><addsrcrecordid>eNotzD1PwzAQAFCDQCKUjkwsmdgS7nz-HJEpUCkIJGCu7NhGRqFBSUHqv-8A09seY5cILSLYm7W7c68tB9Qt2SO2tNqgJKNQW86PWcWllo0RiCesQlDUKMv1GTuf508AkEZRxa67sfe7Mm7rl6n8-n5fl239NIYypHoVP1LthvEnzhfsNPthTst_F-z9fvXmHpvu-WHtbrumoJa7xpMiMhajiBTAB9n7KMBYIAtaRymTykKlnkKKAEFgUBlQKC-ylBk5LdjV31tSSpvvqXz5ab_R1gAaoAMrJD_2</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Location Privacy in Mobile Edge Clouds</title><source>IEEE Xplore All Conference Series</source><creator>Ting He ; Ciftcioglu, Ertugrul N. ; Wang, Shiqiang ; Chan, Kevin S.</creator><creatorcontrib>Ting He ; Ciftcioglu, Ertugrul N. ; Wang, Shiqiang ; Chan, Kevin S.</creatorcontrib><description>In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood (ML) detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. The efficacy of our solutions is verified through extensive simulations.</description><identifier>ISSN: 1063-6927</identifier><identifier>EISSN: 2575-8411</identifier><identifier>EISBN: 9781538617922</identifier><identifier>EISBN: 1538617927</identifier><identifier>DOI: 10.1109/ICDCS.2017.39</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>chaff service ; Cloud computing ; Electronic mail ; location privacy ; Mobile communication ; Mobile edge cloud ; Optimized production technology ; Privacy ; Trajectory ; Wireless communication</subject><ispartof>2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, p.2264-2269</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7980180$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7980180$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ting He</creatorcontrib><creatorcontrib>Ciftcioglu, Ertugrul N.</creatorcontrib><creatorcontrib>Wang, Shiqiang</creatorcontrib><creatorcontrib>Chan, Kevin S.</creatorcontrib><title>Location Privacy in Mobile Edge Clouds</title><title>2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)</title><addtitle>ICDSC</addtitle><description>In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood (ML) detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. The efficacy of our solutions is verified through extensive simulations.</description><subject>chaff service</subject><subject>Cloud computing</subject><subject>Electronic mail</subject><subject>location privacy</subject><subject>Mobile communication</subject><subject>Mobile edge cloud</subject><subject>Optimized production technology</subject><subject>Privacy</subject><subject>Trajectory</subject><subject>Wireless communication</subject><issn>1063-6927</issn><issn>2575-8411</issn><isbn>9781538617922</isbn><isbn>1538617927</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2017</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotzD1PwzAQAFCDQCKUjkwsmdgS7nz-HJEpUCkIJGCu7NhGRqFBSUHqv-8A09seY5cILSLYm7W7c68tB9Qt2SO2tNqgJKNQW86PWcWllo0RiCesQlDUKMv1GTuf508AkEZRxa67sfe7Mm7rl6n8-n5fl239NIYypHoVP1LthvEnzhfsNPthTst_F-z9fvXmHpvu-WHtbrumoJa7xpMiMhajiBTAB9n7KMBYIAtaRymTykKlnkKKAEFgUBlQKC-ylBk5LdjV31tSSpvvqXz5ab_R1gAaoAMrJD_2</recordid><startdate>201706</startdate><enddate>201706</enddate><creator>Ting He</creator><creator>Ciftcioglu, Ertugrul N.</creator><creator>Wang, Shiqiang</creator><creator>Chan, Kevin S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201706</creationdate><title>Location Privacy in Mobile Edge Clouds</title><author>Ting He ; Ciftcioglu, Ertugrul N. ; Wang, Shiqiang ; Chan, Kevin S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-a3633891d4d3b0ab5cad4089039077d55e6f46ec3bed00b41b6f0146a4f55f123</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2017</creationdate><topic>chaff service</topic><topic>Cloud computing</topic><topic>Electronic mail</topic><topic>location privacy</topic><topic>Mobile communication</topic><topic>Mobile edge cloud</topic><topic>Optimized production technology</topic><topic>Privacy</topic><topic>Trajectory</topic><topic>Wireless communication</topic><toplevel>online_resources</toplevel><creatorcontrib>Ting He</creatorcontrib><creatorcontrib>Ciftcioglu, Ertugrul N.</creatorcontrib><creatorcontrib>Wang, Shiqiang</creatorcontrib><creatorcontrib>Chan, Kevin S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ting He</au><au>Ciftcioglu, Ertugrul N.</au><au>Wang, Shiqiang</au><au>Chan, Kevin S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Location Privacy in Mobile Edge Clouds</atitle><btitle>2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)</btitle><stitle>ICDSC</stitle><date>2017-06</date><risdate>2017</risdate><spage>2264</spage><epage>2269</epage><pages>2264-2269</pages><issn>1063-6927</issn><eissn>2575-8411</eissn><eisbn>9781538617922</eisbn><eisbn>1538617927</eisbn><coden>IEEPAD</coden><abstract>In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood (ML) detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. The efficacy of our solutions is verified through extensive simulations.</abstract><pub>IEEE</pub><doi>10.1109/ICDCS.2017.39</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1063-6927 |
ispartof | 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, p.2264-2269 |
issn | 1063-6927 2575-8411 |
language | eng |
recordid | cdi_ieee_primary_7980180 |
source | IEEE Xplore All Conference Series |
subjects | chaff service Cloud computing Electronic mail location privacy Mobile communication Mobile edge cloud Optimized production technology Privacy Trajectory Wireless communication |
title | Location Privacy in Mobile Edge Clouds |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T04%3A19%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Location%20Privacy%20in%20Mobile%20Edge%20Clouds&rft.btitle=2017%20IEEE%2037th%20International%20Conference%20on%20Distributed%20Computing%20Systems%20(ICDCS)&rft.au=Ting%20He&rft.date=2017-06&rft.spage=2264&rft.epage=2269&rft.pages=2264-2269&rft.issn=1063-6927&rft.eissn=2575-8411&rft.coden=IEEPAD&rft_id=info:doi/10.1109/ICDCS.2017.39&rft.eisbn=9781538617922&rft.eisbn_list=1538617927&rft_dat=%3Cieee_CHZPO%3E7980180%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-a3633891d4d3b0ab5cad4089039077d55e6f46ec3bed00b41b6f0146a4f55f123%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7980180&rfr_iscdi=true |