Loading…

Location Privacy in Mobile Edge Clouds

In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location...

Full description

Saved in:
Bibliographic Details
Main Authors: Ting He, Ciftcioglu, Ertugrul N., Wang, Shiqiang, Chan, Kevin S.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 2269
container_issue
container_start_page 2264
container_title
container_volume
creator Ting He
Ciftcioglu, Ertugrul N.
Wang, Shiqiang
Chan, Kevin S.
description In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood (ML) detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. The efficacy of our solutions is verified through extensive simulations.
doi_str_mv 10.1109/ICDCS.2017.39
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_7980180</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7980180</ieee_id><sourcerecordid>7980180</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-a3633891d4d3b0ab5cad4089039077d55e6f46ec3bed00b41b6f0146a4f55f123</originalsourceid><addsrcrecordid>eNotzD1PwzAQAFCDQCKUjkwsmdgS7nz-HJEpUCkIJGCu7NhGRqFBSUHqv-8A09seY5cILSLYm7W7c68tB9Qt2SO2tNqgJKNQW86PWcWllo0RiCesQlDUKMv1GTuf508AkEZRxa67sfe7Mm7rl6n8-n5fl239NIYypHoVP1LthvEnzhfsNPthTst_F-z9fvXmHpvu-WHtbrumoJa7xpMiMhajiBTAB9n7KMBYIAtaRymTykKlnkKKAEFgUBlQKC-ylBk5LdjV31tSSpvvqXz5ab_R1gAaoAMrJD_2</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Location Privacy in Mobile Edge Clouds</title><source>IEEE Xplore All Conference Series</source><creator>Ting He ; Ciftcioglu, Ertugrul N. ; Wang, Shiqiang ; Chan, Kevin S.</creator><creatorcontrib>Ting He ; Ciftcioglu, Ertugrul N. ; Wang, Shiqiang ; Chan, Kevin S.</creatorcontrib><description>In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood (ML) detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. The efficacy of our solutions is verified through extensive simulations.</description><identifier>ISSN: 1063-6927</identifier><identifier>EISSN: 2575-8411</identifier><identifier>EISBN: 9781538617922</identifier><identifier>EISBN: 1538617927</identifier><identifier>DOI: 10.1109/ICDCS.2017.39</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>chaff service ; Cloud computing ; Electronic mail ; location privacy ; Mobile communication ; Mobile edge cloud ; Optimized production technology ; Privacy ; Trajectory ; Wireless communication</subject><ispartof>2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, p.2264-2269</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7980180$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7980180$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ting He</creatorcontrib><creatorcontrib>Ciftcioglu, Ertugrul N.</creatorcontrib><creatorcontrib>Wang, Shiqiang</creatorcontrib><creatorcontrib>Chan, Kevin S.</creatorcontrib><title>Location Privacy in Mobile Edge Clouds</title><title>2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)</title><addtitle>ICDSC</addtitle><description>In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood (ML) detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. The efficacy of our solutions is verified through extensive simulations.</description><subject>chaff service</subject><subject>Cloud computing</subject><subject>Electronic mail</subject><subject>location privacy</subject><subject>Mobile communication</subject><subject>Mobile edge cloud</subject><subject>Optimized production technology</subject><subject>Privacy</subject><subject>Trajectory</subject><subject>Wireless communication</subject><issn>1063-6927</issn><issn>2575-8411</issn><isbn>9781538617922</isbn><isbn>1538617927</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2017</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotzD1PwzAQAFCDQCKUjkwsmdgS7nz-HJEpUCkIJGCu7NhGRqFBSUHqv-8A09seY5cILSLYm7W7c68tB9Qt2SO2tNqgJKNQW86PWcWllo0RiCesQlDUKMv1GTuf508AkEZRxa67sfe7Mm7rl6n8-n5fl239NIYypHoVP1LthvEnzhfsNPthTst_F-z9fvXmHpvu-WHtbrumoJa7xpMiMhajiBTAB9n7KMBYIAtaRymTykKlnkKKAEFgUBlQKC-ylBk5LdjV31tSSpvvqXz5ab_R1gAaoAMrJD_2</recordid><startdate>201706</startdate><enddate>201706</enddate><creator>Ting He</creator><creator>Ciftcioglu, Ertugrul N.</creator><creator>Wang, Shiqiang</creator><creator>Chan, Kevin S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201706</creationdate><title>Location Privacy in Mobile Edge Clouds</title><author>Ting He ; Ciftcioglu, Ertugrul N. ; Wang, Shiqiang ; Chan, Kevin S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-a3633891d4d3b0ab5cad4089039077d55e6f46ec3bed00b41b6f0146a4f55f123</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2017</creationdate><topic>chaff service</topic><topic>Cloud computing</topic><topic>Electronic mail</topic><topic>location privacy</topic><topic>Mobile communication</topic><topic>Mobile edge cloud</topic><topic>Optimized production technology</topic><topic>Privacy</topic><topic>Trajectory</topic><topic>Wireless communication</topic><toplevel>online_resources</toplevel><creatorcontrib>Ting He</creatorcontrib><creatorcontrib>Ciftcioglu, Ertugrul N.</creatorcontrib><creatorcontrib>Wang, Shiqiang</creatorcontrib><creatorcontrib>Chan, Kevin S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE/IET Electronic Library</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ting He</au><au>Ciftcioglu, Ertugrul N.</au><au>Wang, Shiqiang</au><au>Chan, Kevin S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Location Privacy in Mobile Edge Clouds</atitle><btitle>2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)</btitle><stitle>ICDSC</stitle><date>2017-06</date><risdate>2017</risdate><spage>2264</spage><epage>2269</epage><pages>2264-2269</pages><issn>1063-6927</issn><eissn>2575-8411</eissn><eisbn>9781538617922</eisbn><eisbn>1538617927</eisbn><coden>IEEPAD</coden><abstract>In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood (ML) detection, we consider both heuristic strategies that mimic the user's mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy can drive the eavesdropper's tracking accuracy to zero when the user's mobility is sufficiently random. The efficacy of our solutions is verified through extensive simulations.</abstract><pub>IEEE</pub><doi>10.1109/ICDCS.2017.39</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1063-6927
ispartof 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 2017, p.2264-2269
issn 1063-6927
2575-8411
language eng
recordid cdi_ieee_primary_7980180
source IEEE Xplore All Conference Series
subjects chaff service
Cloud computing
Electronic mail
location privacy
Mobile communication
Mobile edge cloud
Optimized production technology
Privacy
Trajectory
Wireless communication
title Location Privacy in Mobile Edge Clouds
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T04%3A19%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Location%20Privacy%20in%20Mobile%20Edge%20Clouds&rft.btitle=2017%20IEEE%2037th%20International%20Conference%20on%20Distributed%20Computing%20Systems%20(ICDCS)&rft.au=Ting%20He&rft.date=2017-06&rft.spage=2264&rft.epage=2269&rft.pages=2264-2269&rft.issn=1063-6927&rft.eissn=2575-8411&rft.coden=IEEPAD&rft_id=info:doi/10.1109/ICDCS.2017.39&rft.eisbn=9781538617922&rft.eisbn_list=1538617927&rft_dat=%3Cieee_CHZPO%3E7980180%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-a3633891d4d3b0ab5cad4089039077d55e6f46ec3bed00b41b6f0146a4f55f123%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7980180&rfr_iscdi=true