Loading…
A Double Obfuscation Approach for Protecting the Privacy of IoT Location based Applications
Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the privacy and security of users' personal...
Saved in:
Published in: | IEEE access 2020-01, Vol.8, p.1-1 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53 |
---|---|
cites | cdi_FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53 |
container_end_page | 1 |
container_issue | |
container_start_page | 1 |
container_title | IEEE access |
container_volume | 8 |
creator | Albouq, Sami S. Sen, Adnan Ahmed Abi Namoun, Abdallah Bahbouh, Nour Mahmoud Alkhodre, Ahmad B. Alshanqiti, Abdullah |
description | Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the privacy and security of users' personal data. Although existing research provides a myriad of methods to improve and protect user privacy in LBS applications, most of these methods are concerned with handling static queries and non-mobile objects only. Moreover, various issues and challenges still persist with regards to the need to trust third parties, overloading of the user, and low accuracy of the returned results. This paper contributes a Double Obfuscation Approach (referred to as DOA) that applies two phases of obfuscation consecutively whilst integrating two differing privacy protection approaches, namely Obfuscation and Trusted Third Party, and two techniques, namely fog caching technology and mix zone. In essence, the DOA obfuscates and hides the identity and location of its users using the fog nodes, which operate as a trusted third party (TTP), and without the need to reveal the identity of the users or trust the cooperating nodes. Moreover, this paper presents a DOA algorithm that improves the overall user privacy and system performance using the fog nodes, which split the responses of each query into five parts, thus reducing the processing time of the results by the user and enhancing the overall accuracy where the user directly selects the most suitable parts based on his current location. Overall, the hybrid DOA approach empowers the users of connected vehicle applications to protect their privacy through an algorithm that caters for the dynamic nature of user queries and mobility of objects. The results of our comparative simulations against well-known hybrid privacy protection methods demonstrate the superiority of the proposed Double Obfuscation Approach especially with respect to user privacy whilst maintaining a nominal overhead on the user, reduced response time and high accuracy of the obtained results. |
doi_str_mv | 10.1109/ACCESS.2020.3009200 |
format | article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2454641021</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9139932</ieee_id><doaj_id>oai_doaj_org_article_141ab607570849a495d632113011683a</doaj_id><sourcerecordid>2454641021</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53</originalsourceid><addsrcrecordid>eNpNkUtrWzEQhS-lgYYkvyAbQdd2ZzT3paVx08RgSCDJqguhxyi5xrVc6TqQfx-514Rqo9FhvqNhTlVdI8wRQf1YLJc3j49zCRLmBKAkwJfqXGKrZtRQ-_W_-lt1lfMGyumL1HTn1e-F-BkPdsvi3oZDdmYc4k4s9vsUjXsVISbxkOLIbhx2L2J85fIc3ox7FzGIVXwS63hirMnsj-R2mJR8WZ0Fs818dbovqudfN0_Lu9n6_na1XKxnroZ-nNXOKDQ-cGc9hd5yAG6cI7QoiRpZSvCWXWvIAHv2wRKCbwOhw44buqhWk6-PZqP3afhj0ruOZtD_hJhetEnj4LassUZjW-iaDvpamVo1viWJSIDY9mSK1_fJqyzg74HzqDfxkHZlfC3rpm5rBImli6Yul2LOicPnrwj6GIqeQtHHUPQplEJdT9TAzJ-EQlKKJH0A9r-Hew</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2454641021</pqid></control><display><type>article</type><title>A Double Obfuscation Approach for Protecting the Privacy of IoT Location based Applications</title><source>IEEE Xplore Open Access Journals</source><creator>Albouq, Sami S. ; Sen, Adnan Ahmed Abi ; Namoun, Abdallah ; Bahbouh, Nour Mahmoud ; Alkhodre, Ahmad B. ; Alshanqiti, Abdullah</creator><creatorcontrib>Albouq, Sami S. ; Sen, Adnan Ahmed Abi ; Namoun, Abdallah ; Bahbouh, Nour Mahmoud ; Alkhodre, Ahmad B. ; Alshanqiti, Abdullah</creatorcontrib><description>Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the privacy and security of users' personal data. Although existing research provides a myriad of methods to improve and protect user privacy in LBS applications, most of these methods are concerned with handling static queries and non-mobile objects only. Moreover, various issues and challenges still persist with regards to the need to trust third parties, overloading of the user, and low accuracy of the returned results. This paper contributes a Double Obfuscation Approach (referred to as DOA) that applies two phases of obfuscation consecutively whilst integrating two differing privacy protection approaches, namely Obfuscation and Trusted Third Party, and two techniques, namely fog caching technology and mix zone. In essence, the DOA obfuscates and hides the identity and location of its users using the fog nodes, which operate as a trusted third party (TTP), and without the need to reveal the identity of the users or trust the cooperating nodes. Moreover, this paper presents a DOA algorithm that improves the overall user privacy and system performance using the fog nodes, which split the responses of each query into five parts, thus reducing the processing time of the results by the user and enhancing the overall accuracy where the user directly selects the most suitable parts based on his current location. Overall, the hybrid DOA approach empowers the users of connected vehicle applications to protect their privacy through an algorithm that caters for the dynamic nature of user queries and mobility of objects. The results of our comparative simulations against well-known hybrid privacy protection methods demonstrate the superiority of the proposed Double Obfuscation Approach especially with respect to user privacy whilst maintaining a nominal overhead on the user, reduced response time and high accuracy of the obtained results.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2020.3009200</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Accuracy ; Algorithms ; Caching ; Cloud computing ; Connected Vehicles ; Data privacy ; Edge computing ; Internet of Things ; Location based Services ; Nodes ; Obfuscation ; Privacy ; Queries ; Response time ; Security ; Smart cars ; System performance ; Trusted third parties ; Trusted Third Party</subject><ispartof>IEEE access, 2020-01, Vol.8, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53</citedby><cites>FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53</cites><orcidid>0000-0002-7050-0532 ; 0000-0002-1549-7334 ; 0000-0003-2960-5807 ; 0000-0002-6080-5236</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9139932$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,27632,27923,27924,54932</link.rule.ids></links><search><creatorcontrib>Albouq, Sami S.</creatorcontrib><creatorcontrib>Sen, Adnan Ahmed Abi</creatorcontrib><creatorcontrib>Namoun, Abdallah</creatorcontrib><creatorcontrib>Bahbouh, Nour Mahmoud</creatorcontrib><creatorcontrib>Alkhodre, Ahmad B.</creatorcontrib><creatorcontrib>Alshanqiti, Abdullah</creatorcontrib><title>A Double Obfuscation Approach for Protecting the Privacy of IoT Location based Applications</title><title>IEEE access</title><addtitle>Access</addtitle><description>Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the privacy and security of users' personal data. Although existing research provides a myriad of methods to improve and protect user privacy in LBS applications, most of these methods are concerned with handling static queries and non-mobile objects only. Moreover, various issues and challenges still persist with regards to the need to trust third parties, overloading of the user, and low accuracy of the returned results. This paper contributes a Double Obfuscation Approach (referred to as DOA) that applies two phases of obfuscation consecutively whilst integrating two differing privacy protection approaches, namely Obfuscation and Trusted Third Party, and two techniques, namely fog caching technology and mix zone. In essence, the DOA obfuscates and hides the identity and location of its users using the fog nodes, which operate as a trusted third party (TTP), and without the need to reveal the identity of the users or trust the cooperating nodes. Moreover, this paper presents a DOA algorithm that improves the overall user privacy and system performance using the fog nodes, which split the responses of each query into five parts, thus reducing the processing time of the results by the user and enhancing the overall accuracy where the user directly selects the most suitable parts based on his current location. Overall, the hybrid DOA approach empowers the users of connected vehicle applications to protect their privacy through an algorithm that caters for the dynamic nature of user queries and mobility of objects. The results of our comparative simulations against well-known hybrid privacy protection methods demonstrate the superiority of the proposed Double Obfuscation Approach especially with respect to user privacy whilst maintaining a nominal overhead on the user, reduced response time and high accuracy of the obtained results.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Caching</subject><subject>Cloud computing</subject><subject>Connected Vehicles</subject><subject>Data privacy</subject><subject>Edge computing</subject><subject>Internet of Things</subject><subject>Location based Services</subject><subject>Nodes</subject><subject>Obfuscation</subject><subject>Privacy</subject><subject>Queries</subject><subject>Response time</subject><subject>Security</subject><subject>Smart cars</subject><subject>System performance</subject><subject>Trusted third parties</subject><subject>Trusted Third Party</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNkUtrWzEQhS-lgYYkvyAbQdd2ZzT3paVx08RgSCDJqguhxyi5xrVc6TqQfx-514Rqo9FhvqNhTlVdI8wRQf1YLJc3j49zCRLmBKAkwJfqXGKrZtRQ-_W_-lt1lfMGyumL1HTn1e-F-BkPdsvi3oZDdmYc4k4s9vsUjXsVISbxkOLIbhx2L2J85fIc3ox7FzGIVXwS63hirMnsj-R2mJR8WZ0Fs818dbovqudfN0_Lu9n6_na1XKxnroZ-nNXOKDQ-cGc9hd5yAG6cI7QoiRpZSvCWXWvIAHv2wRKCbwOhw44buqhWk6-PZqP3afhj0ruOZtD_hJhetEnj4LassUZjW-iaDvpamVo1viWJSIDY9mSK1_fJqyzg74HzqDfxkHZlfC3rpm5rBImli6Yul2LOicPnrwj6GIqeQtHHUPQplEJdT9TAzJ-EQlKKJH0A9r-Hew</recordid><startdate>20200101</startdate><enddate>20200101</enddate><creator>Albouq, Sami S.</creator><creator>Sen, Adnan Ahmed Abi</creator><creator>Namoun, Abdallah</creator><creator>Bahbouh, Nour Mahmoud</creator><creator>Alkhodre, Ahmad B.</creator><creator>Alshanqiti, Abdullah</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-7050-0532</orcidid><orcidid>https://orcid.org/0000-0002-1549-7334</orcidid><orcidid>https://orcid.org/0000-0003-2960-5807</orcidid><orcidid>https://orcid.org/0000-0002-6080-5236</orcidid></search><sort><creationdate>20200101</creationdate><title>A Double Obfuscation Approach for Protecting the Privacy of IoT Location based Applications</title><author>Albouq, Sami S. ; Sen, Adnan Ahmed Abi ; Namoun, Abdallah ; Bahbouh, Nour Mahmoud ; Alkhodre, Ahmad B. ; Alshanqiti, Abdullah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Caching</topic><topic>Cloud computing</topic><topic>Connected Vehicles</topic><topic>Data privacy</topic><topic>Edge computing</topic><topic>Internet of Things</topic><topic>Location based Services</topic><topic>Nodes</topic><topic>Obfuscation</topic><topic>Privacy</topic><topic>Queries</topic><topic>Response time</topic><topic>Security</topic><topic>Smart cars</topic><topic>System performance</topic><topic>Trusted third parties</topic><topic>Trusted Third Party</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Albouq, Sami S.</creatorcontrib><creatorcontrib>Sen, Adnan Ahmed Abi</creatorcontrib><creatorcontrib>Namoun, Abdallah</creatorcontrib><creatorcontrib>Bahbouh, Nour Mahmoud</creatorcontrib><creatorcontrib>Alkhodre, Ahmad B.</creatorcontrib><creatorcontrib>Alshanqiti, Abdullah</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Albouq, Sami S.</au><au>Sen, Adnan Ahmed Abi</au><au>Namoun, Abdallah</au><au>Bahbouh, Nour Mahmoud</au><au>Alkhodre, Ahmad B.</au><au>Alshanqiti, Abdullah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Double Obfuscation Approach for Protecting the Privacy of IoT Location based Applications</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2020-01-01</date><risdate>2020</risdate><volume>8</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the privacy and security of users' personal data. Although existing research provides a myriad of methods to improve and protect user privacy in LBS applications, most of these methods are concerned with handling static queries and non-mobile objects only. Moreover, various issues and challenges still persist with regards to the need to trust third parties, overloading of the user, and low accuracy of the returned results. This paper contributes a Double Obfuscation Approach (referred to as DOA) that applies two phases of obfuscation consecutively whilst integrating two differing privacy protection approaches, namely Obfuscation and Trusted Third Party, and two techniques, namely fog caching technology and mix zone. In essence, the DOA obfuscates and hides the identity and location of its users using the fog nodes, which operate as a trusted third party (TTP), and without the need to reveal the identity of the users or trust the cooperating nodes. Moreover, this paper presents a DOA algorithm that improves the overall user privacy and system performance using the fog nodes, which split the responses of each query into five parts, thus reducing the processing time of the results by the user and enhancing the overall accuracy where the user directly selects the most suitable parts based on his current location. Overall, the hybrid DOA approach empowers the users of connected vehicle applications to protect their privacy through an algorithm that caters for the dynamic nature of user queries and mobility of objects. The results of our comparative simulations against well-known hybrid privacy protection methods demonstrate the superiority of the proposed Double Obfuscation Approach especially with respect to user privacy whilst maintaining a nominal overhead on the user, reduced response time and high accuracy of the obtained results.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2020.3009200</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-7050-0532</orcidid><orcidid>https://orcid.org/0000-0002-1549-7334</orcidid><orcidid>https://orcid.org/0000-0003-2960-5807</orcidid><orcidid>https://orcid.org/0000-0002-6080-5236</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2020-01, Vol.8, p.1-1 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_proquest_journals_2454641021 |
source | IEEE Xplore Open Access Journals |
subjects | Accuracy Algorithms Caching Cloud computing Connected Vehicles Data privacy Edge computing Internet of Things Location based Services Nodes Obfuscation Privacy Queries Response time Security Smart cars System performance Trusted third parties Trusted Third Party |
title | A Double Obfuscation Approach for Protecting the Privacy of IoT Location based Applications |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T03%3A17%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Double%20Obfuscation%20Approach%20for%20Protecting%20the%20Privacy%20of%20IoT%20Location%20based%20Applications&rft.jtitle=IEEE%20access&rft.au=Albouq,%20Sami%20S.&rft.date=2020-01-01&rft.volume=8&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2020.3009200&rft_dat=%3Cproquest_ieee_%3E2454641021%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2454641021&rft_id=info:pmid/&rft_ieee_id=9139932&rfr_iscdi=true |