Loading…

Location Privacy Using Data Obfuscation in Fog Computing

In the past few decades, smartphones and Global Positioning System(GPS) devices have led to the popularity of Location Based Services. It is crucial for large MNCs to get a lot of data from people and provide their services accordingly. However, on the other side, the concern of privacy has also inc...

Full description

Saved in:
Bibliographic Details
Main Authors: Naik, Chandan, Siddhartha, M, Martin, John Paul, Chandrasekaran, K.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 1291
container_issue
container_start_page 1286
container_title
container_volume
creator Naik, Chandan
Siddhartha, M
Martin, John Paul
Chandrasekaran, K.
description In the past few decades, smartphones and Global Positioning System(GPS) devices have led to the popularity of Location Based Services. It is crucial for large MNCs to get a lot of data from people and provide their services accordingly. However, on the other side, the concern of privacy has also increased among the users, and they would like to hide their whereabouts. The rise of data consumption and the hunger for faster network speed has also led to the emergence of new concepts such as the Fog Computing. Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while removing the load on the server centers and decreasing the latency at the edge device. The fog computing will help in unlimited growth of location services and this adoption of fog computing calls for the need for more secure and robust algorithms for location privacy. One of the ways we can alter the information regarding the location of the user is Location Obfuscation. This can be done reversibly or irreversibly. In this paper, we address the problem of location privacy and present a solution based on the type of data that has to be preserved (in our case, it is distance). A mobile application has been designed and developed to test and validate the feasibility of the proposed obfuscation techniques for the Fog computing environments.
doi_str_mv 10.1109/TENCON.2019.8929236
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_8929236</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8929236</ieee_id><sourcerecordid>8929236</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-e1464ba2925f0f30b250493d7931afad8019e2b0d3634c97b15dd6e183c9b5063</originalsourceid><addsrcrecordid>eNotj8FqwzAQRNVCICH1F-SiH7C7q7Vk6VjcpA2YuIfkHCRbDiqNHWynkL-voZ7LHGYY3jC2QUgQwbwet4e8PCQC0CTaCCNIPbHIZBozoRG1keqZrQRKE1MqYcmiYfiGSQoE6GzFdNFVdgxdy7_68GurBz8Nob3wdztaXrrmPsxxaPmuu_C8u97u49R4YYvG_gw-mn3NTrvtMf-Mi_Jjn78VcRBAY-wxVamzE5lsoCFwQkJqqM4MoW1srSdyLxzUpCitTOZQ1rXyqKkyToKiNdv87wbv_fnWh6vtH-f5K_0BBHVGsg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Location Privacy Using Data Obfuscation in Fog Computing</title><source>IEEE Xplore All Conference Series</source><creator>Naik, Chandan ; Siddhartha, M ; Martin, John Paul ; Chandrasekaran, K.</creator><creatorcontrib>Naik, Chandan ; Siddhartha, M ; Martin, John Paul ; Chandrasekaran, K.</creatorcontrib><description>In the past few decades, smartphones and Global Positioning System(GPS) devices have led to the popularity of Location Based Services. It is crucial for large MNCs to get a lot of data from people and provide their services accordingly. However, on the other side, the concern of privacy has also increased among the users, and they would like to hide their whereabouts. The rise of data consumption and the hunger for faster network speed has also led to the emergence of new concepts such as the Fog Computing. Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while removing the load on the server centers and decreasing the latency at the edge device. The fog computing will help in unlimited growth of location services and this adoption of fog computing calls for the need for more secure and robust algorithms for location privacy. One of the ways we can alter the information regarding the location of the user is Location Obfuscation. This can be done reversibly or irreversibly. In this paper, we address the problem of location privacy and present a solution based on the type of data that has to be preserved (in our case, it is distance). A mobile application has been designed and developed to test and validate the feasibility of the proposed obfuscation techniques for the Fog computing environments.</description><identifier>EISSN: 2159-3450</identifier><identifier>EISBN: 9781728118956</identifier><identifier>EISBN: 1728118956</identifier><identifier>DOI: 10.1109/TENCON.2019.8929236</identifier><language>eng</language><publisher>IEEE</publisher><subject>Data privacy ; Data-Obfuscation ; Edge computing ; Encryption ; Fog-Computing ; Global Positioning System ; Location awareness ; Location-Privacy ; Privacy ; Security</subject><ispartof>TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON), 2019, p.1286-1291</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8929236$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8929236$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Naik, Chandan</creatorcontrib><creatorcontrib>Siddhartha, M</creatorcontrib><creatorcontrib>Martin, John Paul</creatorcontrib><creatorcontrib>Chandrasekaran, K.</creatorcontrib><title>Location Privacy Using Data Obfuscation in Fog Computing</title><title>TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)</title><addtitle>TENCON</addtitle><description>In the past few decades, smartphones and Global Positioning System(GPS) devices have led to the popularity of Location Based Services. It is crucial for large MNCs to get a lot of data from people and provide their services accordingly. However, on the other side, the concern of privacy has also increased among the users, and they would like to hide their whereabouts. The rise of data consumption and the hunger for faster network speed has also led to the emergence of new concepts such as the Fog Computing. Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while removing the load on the server centers and decreasing the latency at the edge device. The fog computing will help in unlimited growth of location services and this adoption of fog computing calls for the need for more secure and robust algorithms for location privacy. One of the ways we can alter the information regarding the location of the user is Location Obfuscation. This can be done reversibly or irreversibly. In this paper, we address the problem of location privacy and present a solution based on the type of data that has to be preserved (in our case, it is distance). A mobile application has been designed and developed to test and validate the feasibility of the proposed obfuscation techniques for the Fog computing environments.</description><subject>Data privacy</subject><subject>Data-Obfuscation</subject><subject>Edge computing</subject><subject>Encryption</subject><subject>Fog-Computing</subject><subject>Global Positioning System</subject><subject>Location awareness</subject><subject>Location-Privacy</subject><subject>Privacy</subject><subject>Security</subject><issn>2159-3450</issn><isbn>9781728118956</isbn><isbn>1728118956</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2019</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj8FqwzAQRNVCICH1F-SiH7C7q7Vk6VjcpA2YuIfkHCRbDiqNHWynkL-voZ7LHGYY3jC2QUgQwbwet4e8PCQC0CTaCCNIPbHIZBozoRG1keqZrQRKE1MqYcmiYfiGSQoE6GzFdNFVdgxdy7_68GurBz8Nob3wdztaXrrmPsxxaPmuu_C8u97u49R4YYvG_gw-mn3NTrvtMf-Mi_Jjn78VcRBAY-wxVamzE5lsoCFwQkJqqM4MoW1srSdyLxzUpCitTOZQ1rXyqKkyToKiNdv87wbv_fnWh6vtH-f5K_0BBHVGsg</recordid><startdate>201910</startdate><enddate>201910</enddate><creator>Naik, Chandan</creator><creator>Siddhartha, M</creator><creator>Martin, John Paul</creator><creator>Chandrasekaran, K.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201910</creationdate><title>Location Privacy Using Data Obfuscation in Fog Computing</title><author>Naik, Chandan ; Siddhartha, M ; Martin, John Paul ; Chandrasekaran, K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-e1464ba2925f0f30b250493d7931afad8019e2b0d3634c97b15dd6e183c9b5063</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Data privacy</topic><topic>Data-Obfuscation</topic><topic>Edge computing</topic><topic>Encryption</topic><topic>Fog-Computing</topic><topic>Global Positioning System</topic><topic>Location awareness</topic><topic>Location-Privacy</topic><topic>Privacy</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Naik, Chandan</creatorcontrib><creatorcontrib>Siddhartha, M</creatorcontrib><creatorcontrib>Martin, John Paul</creatorcontrib><creatorcontrib>Chandrasekaran, K.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore (Online service)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Naik, Chandan</au><au>Siddhartha, M</au><au>Martin, John Paul</au><au>Chandrasekaran, K.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Location Privacy Using Data Obfuscation in Fog Computing</atitle><btitle>TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON)</btitle><stitle>TENCON</stitle><date>2019-10</date><risdate>2019</risdate><spage>1286</spage><epage>1291</epage><pages>1286-1291</pages><eissn>2159-3450</eissn><eisbn>9781728118956</eisbn><eisbn>1728118956</eisbn><abstract>In the past few decades, smartphones and Global Positioning System(GPS) devices have led to the popularity of Location Based Services. It is crucial for large MNCs to get a lot of data from people and provide their services accordingly. However, on the other side, the concern of privacy has also increased among the users, and they would like to hide their whereabouts. The rise of data consumption and the hunger for faster network speed has also led to the emergence of new concepts such as the Fog Computing. Fog computing paradigm extends the storage, networking, and computing facilities of the cloud computing towards the edge of the networks while removing the load on the server centers and decreasing the latency at the edge device. The fog computing will help in unlimited growth of location services and this adoption of fog computing calls for the need for more secure and robust algorithms for location privacy. One of the ways we can alter the information regarding the location of the user is Location Obfuscation. This can be done reversibly or irreversibly. In this paper, we address the problem of location privacy and present a solution based on the type of data that has to be preserved (in our case, it is distance). A mobile application has been designed and developed to test and validate the feasibility of the proposed obfuscation techniques for the Fog computing environments.</abstract><pub>IEEE</pub><doi>10.1109/TENCON.2019.8929236</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2159-3450
ispartof TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON), 2019, p.1286-1291
issn 2159-3450
language eng
recordid cdi_ieee_primary_8929236
source IEEE Xplore All Conference Series
subjects Data privacy
Data-Obfuscation
Edge computing
Encryption
Fog-Computing
Global Positioning System
Location awareness
Location-Privacy
Privacy
Security
title Location Privacy Using Data Obfuscation in Fog Computing
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T03%3A12%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Location%20Privacy%20Using%20Data%20Obfuscation%20in%20Fog%20Computing&rft.btitle=TENCON%202019%20-%202019%20IEEE%20Region%2010%20Conference%20(TENCON)&rft.au=Naik,%20Chandan&rft.date=2019-10&rft.spage=1286&rft.epage=1291&rft.pages=1286-1291&rft.eissn=2159-3450&rft_id=info:doi/10.1109/TENCON.2019.8929236&rft.eisbn=9781728118956&rft.eisbn_list=1728118956&rft_dat=%3Cieee_CHZPO%3E8929236%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i203t-e1464ba2925f0f30b250493d7931afad8019e2b0d3634c97b15dd6e183c9b5063%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=8929236&rfr_iscdi=true