Loading…

A Double Obfuscation Approach for Protecting the Privacy of IoT Location based Applications

Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the privacy and security of users' personal...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access 2020-01, Vol.8, p.1-1
Main Authors: Albouq, Sami S., Sen, Adnan Ahmed Abi, Namoun, Abdallah, Bahbouh, Nour Mahmoud, Alkhodre, Ahmad B., Alshanqiti, Abdullah
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53
cites cdi_FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53
container_end_page 1
container_issue
container_start_page 1
container_title IEEE access
container_volume 8
creator Albouq, Sami S.
Sen, Adnan Ahmed Abi
Namoun, Abdallah
Bahbouh, Nour Mahmoud
Alkhodre, Ahmad B.
Alshanqiti, Abdullah
description Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the privacy and security of users' personal data. Although existing research provides a myriad of methods to improve and protect user privacy in LBS applications, most of these methods are concerned with handling static queries and non-mobile objects only. Moreover, various issues and challenges still persist with regards to the need to trust third parties, overloading of the user, and low accuracy of the returned results. This paper contributes a Double Obfuscation Approach (referred to as DOA) that applies two phases of obfuscation consecutively whilst integrating two differing privacy protection approaches, namely Obfuscation and Trusted Third Party, and two techniques, namely fog caching technology and mix zone. In essence, the DOA obfuscates and hides the identity and location of its users using the fog nodes, which operate as a trusted third party (TTP), and without the need to reveal the identity of the users or trust the cooperating nodes. Moreover, this paper presents a DOA algorithm that improves the overall user privacy and system performance using the fog nodes, which split the responses of each query into five parts, thus reducing the processing time of the results by the user and enhancing the overall accuracy where the user directly selects the most suitable parts based on his current location. Overall, the hybrid DOA approach empowers the users of connected vehicle applications to protect their privacy through an algorithm that caters for the dynamic nature of user queries and mobility of objects. The results of our comparative simulations against well-known hybrid privacy protection methods demonstrate the superiority of the proposed Double Obfuscation Approach especially with respect to user privacy whilst maintaining a nominal overhead on the user, reduced response time and high accuracy of the obtained results.
doi_str_mv 10.1109/ACCESS.2020.3009200
format article
fullrecord <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_proquest_journals_2454641021</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9139932</ieee_id><doaj_id>oai_doaj_org_article_141ab607570849a495d632113011683a</doaj_id><sourcerecordid>2454641021</sourcerecordid><originalsourceid>FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53</originalsourceid><addsrcrecordid>eNpNkUtrWzEQhS-lgYYkvyAbQdd2ZzT3paVx08RgSCDJqguhxyi5xrVc6TqQfx-514Rqo9FhvqNhTlVdI8wRQf1YLJc3j49zCRLmBKAkwJfqXGKrZtRQ-_W_-lt1lfMGyumL1HTn1e-F-BkPdsvi3oZDdmYc4k4s9vsUjXsVISbxkOLIbhx2L2J85fIc3ox7FzGIVXwS63hirMnsj-R2mJR8WZ0Fs818dbovqudfN0_Lu9n6_na1XKxnroZ-nNXOKDQ-cGc9hd5yAG6cI7QoiRpZSvCWXWvIAHv2wRKCbwOhw44buqhWk6-PZqP3afhj0ruOZtD_hJhetEnj4LassUZjW-iaDvpamVo1viWJSIDY9mSK1_fJqyzg74HzqDfxkHZlfC3rpm5rBImli6Yul2LOicPnrwj6GIqeQtHHUPQplEJdT9TAzJ-EQlKKJH0A9r-Hew</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2454641021</pqid></control><display><type>article</type><title>A Double Obfuscation Approach for Protecting the Privacy of IoT Location based Applications</title><source>IEEE Xplore Open Access Journals</source><creator>Albouq, Sami S. ; Sen, Adnan Ahmed Abi ; Namoun, Abdallah ; Bahbouh, Nour Mahmoud ; Alkhodre, Ahmad B. ; Alshanqiti, Abdullah</creator><creatorcontrib>Albouq, Sami S. ; Sen, Adnan Ahmed Abi ; Namoun, Abdallah ; Bahbouh, Nour Mahmoud ; Alkhodre, Ahmad B. ; Alshanqiti, Abdullah</creatorcontrib><description>Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the privacy and security of users' personal data. Although existing research provides a myriad of methods to improve and protect user privacy in LBS applications, most of these methods are concerned with handling static queries and non-mobile objects only. Moreover, various issues and challenges still persist with regards to the need to trust third parties, overloading of the user, and low accuracy of the returned results. This paper contributes a Double Obfuscation Approach (referred to as DOA) that applies two phases of obfuscation consecutively whilst integrating two differing privacy protection approaches, namely Obfuscation and Trusted Third Party, and two techniques, namely fog caching technology and mix zone. In essence, the DOA obfuscates and hides the identity and location of its users using the fog nodes, which operate as a trusted third party (TTP), and without the need to reveal the identity of the users or trust the cooperating nodes. Moreover, this paper presents a DOA algorithm that improves the overall user privacy and system performance using the fog nodes, which split the responses of each query into five parts, thus reducing the processing time of the results by the user and enhancing the overall accuracy where the user directly selects the most suitable parts based on his current location. Overall, the hybrid DOA approach empowers the users of connected vehicle applications to protect their privacy through an algorithm that caters for the dynamic nature of user queries and mobility of objects. The results of our comparative simulations against well-known hybrid privacy protection methods demonstrate the superiority of the proposed Double Obfuscation Approach especially with respect to user privacy whilst maintaining a nominal overhead on the user, reduced response time and high accuracy of the obtained results.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2020.3009200</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Accuracy ; Algorithms ; Caching ; Cloud computing ; Connected Vehicles ; Data privacy ; Edge computing ; Internet of Things ; Location based Services ; Nodes ; Obfuscation ; Privacy ; Queries ; Response time ; Security ; Smart cars ; System performance ; Trusted third parties ; Trusted Third Party</subject><ispartof>IEEE access, 2020-01, Vol.8, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53</citedby><cites>FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53</cites><orcidid>0000-0002-7050-0532 ; 0000-0002-1549-7334 ; 0000-0003-2960-5807 ; 0000-0002-6080-5236</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9139932$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,27632,27923,27924,54932</link.rule.ids></links><search><creatorcontrib>Albouq, Sami S.</creatorcontrib><creatorcontrib>Sen, Adnan Ahmed Abi</creatorcontrib><creatorcontrib>Namoun, Abdallah</creatorcontrib><creatorcontrib>Bahbouh, Nour Mahmoud</creatorcontrib><creatorcontrib>Alkhodre, Ahmad B.</creatorcontrib><creatorcontrib>Alshanqiti, Abdullah</creatorcontrib><title>A Double Obfuscation Approach for Protecting the Privacy of IoT Location based Applications</title><title>IEEE access</title><addtitle>Access</addtitle><description>Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the privacy and security of users' personal data. Although existing research provides a myriad of methods to improve and protect user privacy in LBS applications, most of these methods are concerned with handling static queries and non-mobile objects only. Moreover, various issues and challenges still persist with regards to the need to trust third parties, overloading of the user, and low accuracy of the returned results. This paper contributes a Double Obfuscation Approach (referred to as DOA) that applies two phases of obfuscation consecutively whilst integrating two differing privacy protection approaches, namely Obfuscation and Trusted Third Party, and two techniques, namely fog caching technology and mix zone. In essence, the DOA obfuscates and hides the identity and location of its users using the fog nodes, which operate as a trusted third party (TTP), and without the need to reveal the identity of the users or trust the cooperating nodes. Moreover, this paper presents a DOA algorithm that improves the overall user privacy and system performance using the fog nodes, which split the responses of each query into five parts, thus reducing the processing time of the results by the user and enhancing the overall accuracy where the user directly selects the most suitable parts based on his current location. Overall, the hybrid DOA approach empowers the users of connected vehicle applications to protect their privacy through an algorithm that caters for the dynamic nature of user queries and mobility of objects. The results of our comparative simulations against well-known hybrid privacy protection methods demonstrate the superiority of the proposed Double Obfuscation Approach especially with respect to user privacy whilst maintaining a nominal overhead on the user, reduced response time and high accuracy of the obtained results.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Caching</subject><subject>Cloud computing</subject><subject>Connected Vehicles</subject><subject>Data privacy</subject><subject>Edge computing</subject><subject>Internet of Things</subject><subject>Location based Services</subject><subject>Nodes</subject><subject>Obfuscation</subject><subject>Privacy</subject><subject>Queries</subject><subject>Response time</subject><subject>Security</subject><subject>Smart cars</subject><subject>System performance</subject><subject>Trusted third parties</subject><subject>Trusted Third Party</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNkUtrWzEQhS-lgYYkvyAbQdd2ZzT3paVx08RgSCDJqguhxyi5xrVc6TqQfx-514Rqo9FhvqNhTlVdI8wRQf1YLJc3j49zCRLmBKAkwJfqXGKrZtRQ-_W_-lt1lfMGyumL1HTn1e-F-BkPdsvi3oZDdmYc4k4s9vsUjXsVISbxkOLIbhx2L2J85fIc3ox7FzGIVXwS63hirMnsj-R2mJR8WZ0Fs818dbovqudfN0_Lu9n6_na1XKxnroZ-nNXOKDQ-cGc9hd5yAG6cI7QoiRpZSvCWXWvIAHv2wRKCbwOhw44buqhWk6-PZqP3afhj0ruOZtD_hJhetEnj4LassUZjW-iaDvpamVo1viWJSIDY9mSK1_fJqyzg74HzqDfxkHZlfC3rpm5rBImli6Yul2LOicPnrwj6GIqeQtHHUPQplEJdT9TAzJ-EQlKKJH0A9r-Hew</recordid><startdate>20200101</startdate><enddate>20200101</enddate><creator>Albouq, Sami S.</creator><creator>Sen, Adnan Ahmed Abi</creator><creator>Namoun, Abdallah</creator><creator>Bahbouh, Nour Mahmoud</creator><creator>Alkhodre, Ahmad B.</creator><creator>Alshanqiti, Abdullah</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-7050-0532</orcidid><orcidid>https://orcid.org/0000-0002-1549-7334</orcidid><orcidid>https://orcid.org/0000-0003-2960-5807</orcidid><orcidid>https://orcid.org/0000-0002-6080-5236</orcidid></search><sort><creationdate>20200101</creationdate><title>A Double Obfuscation Approach for Protecting the Privacy of IoT Location based Applications</title><author>Albouq, Sami S. ; Sen, Adnan Ahmed Abi ; Namoun, Abdallah ; Bahbouh, Nour Mahmoud ; Alkhodre, Ahmad B. ; Alshanqiti, Abdullah</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Caching</topic><topic>Cloud computing</topic><topic>Connected Vehicles</topic><topic>Data privacy</topic><topic>Edge computing</topic><topic>Internet of Things</topic><topic>Location based Services</topic><topic>Nodes</topic><topic>Obfuscation</topic><topic>Privacy</topic><topic>Queries</topic><topic>Response time</topic><topic>Security</topic><topic>Smart cars</topic><topic>System performance</topic><topic>Trusted third parties</topic><topic>Trusted Third Party</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Albouq, Sami S.</creatorcontrib><creatorcontrib>Sen, Adnan Ahmed Abi</creatorcontrib><creatorcontrib>Namoun, Abdallah</creatorcontrib><creatorcontrib>Bahbouh, Nour Mahmoud</creatorcontrib><creatorcontrib>Alkhodre, Ahmad B.</creatorcontrib><creatorcontrib>Alshanqiti, Abdullah</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Albouq, Sami S.</au><au>Sen, Adnan Ahmed Abi</au><au>Namoun, Abdallah</au><au>Bahbouh, Nour Mahmoud</au><au>Alkhodre, Ahmad B.</au><au>Alshanqiti, Abdullah</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Double Obfuscation Approach for Protecting the Privacy of IoT Location based Applications</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2020-01-01</date><risdate>2020</risdate><volume>8</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Connected vehicles and smart cars have become highly reliant on location-based services (i.e. LBS) to provide accurate, personalized and intelligent services. However, location-based services have endangered its users to considerable risks concerning the privacy and security of users' personal data. Although existing research provides a myriad of methods to improve and protect user privacy in LBS applications, most of these methods are concerned with handling static queries and non-mobile objects only. Moreover, various issues and challenges still persist with regards to the need to trust third parties, overloading of the user, and low accuracy of the returned results. This paper contributes a Double Obfuscation Approach (referred to as DOA) that applies two phases of obfuscation consecutively whilst integrating two differing privacy protection approaches, namely Obfuscation and Trusted Third Party, and two techniques, namely fog caching technology and mix zone. In essence, the DOA obfuscates and hides the identity and location of its users using the fog nodes, which operate as a trusted third party (TTP), and without the need to reveal the identity of the users or trust the cooperating nodes. Moreover, this paper presents a DOA algorithm that improves the overall user privacy and system performance using the fog nodes, which split the responses of each query into five parts, thus reducing the processing time of the results by the user and enhancing the overall accuracy where the user directly selects the most suitable parts based on his current location. Overall, the hybrid DOA approach empowers the users of connected vehicle applications to protect their privacy through an algorithm that caters for the dynamic nature of user queries and mobility of objects. The results of our comparative simulations against well-known hybrid privacy protection methods demonstrate the superiority of the proposed Double Obfuscation Approach especially with respect to user privacy whilst maintaining a nominal overhead on the user, reduced response time and high accuracy of the obtained results.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2020.3009200</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-7050-0532</orcidid><orcidid>https://orcid.org/0000-0002-1549-7334</orcidid><orcidid>https://orcid.org/0000-0003-2960-5807</orcidid><orcidid>https://orcid.org/0000-0002-6080-5236</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2020-01, Vol.8, p.1-1
issn 2169-3536
2169-3536
language eng
recordid cdi_proquest_journals_2454641021
source IEEE Xplore Open Access Journals
subjects Accuracy
Algorithms
Caching
Cloud computing
Connected Vehicles
Data privacy
Edge computing
Internet of Things
Location based Services
Nodes
Obfuscation
Privacy
Queries
Response time
Security
Smart cars
System performance
Trusted third parties
Trusted Third Party
title A Double Obfuscation Approach for Protecting the Privacy of IoT Location based Applications
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-09T03%3A17%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Double%20Obfuscation%20Approach%20for%20Protecting%20the%20Privacy%20of%20IoT%20Location%20based%20Applications&rft.jtitle=IEEE%20access&rft.au=Albouq,%20Sami%20S.&rft.date=2020-01-01&rft.volume=8&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2020.3009200&rft_dat=%3Cproquest_ieee_%3E2454641021%3C/proquest_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c408t-4ca91adfe7bd3f8bef0e5cc31b123352cc30dbec6a3a0ededfb310d6f31c17e53%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2454641021&rft_id=info:pmid/&rft_ieee_id=9139932&rfr_iscdi=true