A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing

被引:36
|
作者
Zhang, Shiwen [1 ]
Hu, Biao [1 ]
Liang, Wei [1 ]
Li, Kuan-Ching [2 ]
Gupta, Brij B. [3 ,4 ,5 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Providence Univ, Dept Comp Sci & Informat Engn, Taichung 43301, Taiwan
[3] Macquarie Univ, Fac Sci & Engn, Macquarie Pk, NSW 2109, Australia
[4] Symbiosis Int Univ, Symbiosis Ctr Informat Technol, Pune 411115, India
[5] Univ Petr & Energy Studies, Ctr Interdisciplinary Res, Dehra Dun 110048, India
基金
中国国家自然科学基金;
关键词
Privacy; Servers; Computer architecture; Task analysis; Edge computing; Costs; Encryption; Caching; dual K-anonymity; edge computing; K-anonymity; location privacy; location-based services; TASK ALLOCATION; USERS;
D O I
10.1109/JIOT.2023.3235707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location-based services have become prevalent and the risk of location privacy leakage increases. Most existing schemes use third-party-based or third-party-free system architectures; the former suffers from a single point of failure (SPOF) and the latter experiences a heavy load on user terminal equipment and higher communication costs. Ensuring location privacy while lowering system overhead becomes a challenge. Many existing schemes fail to leverage the responses from an LBS server; such responses can be cached to answer subsequent queries. As a result, providing users with a relatively comprehensive level of location privacy protection is troublesome. In this article, we propose a caching-based dual K-anonymous (CDKA) location privacy-preserving scheme in edge computing environments. Our scheme employs an edge server to intercedes between a user and LBS the server. We reduce the load on the user device by applying multilevel caching and to protect location privacy through dual anonymity. To ensure the location privacy in our construction, we set mobile clients and edge servers as anonymous. We use caching to lower the communication overhead and enforce the location privacy. The security analysis of our scheme supports its robustness against the edge server and the LBS server privacy offenses. We rely on the computation time, the communication cost, and the cache hit ratio to evaluate our work against existing constructions. The results are twofold: our work possesses a better response rate down to 15-32.6 ms and exhibits lower communication cost requirements down to 6.2-38.9 kB compared to existing works. Our scheme witnesses a higher cache hit ratio of up to 13.6% and 39.1% compared to the literature.
引用
收藏
页码:9768 / 9781
页数:14
相关论文
共 50 条
  • [1] Location privacy-preserving method of k-anonymous based on service similarity
    Ye, A-Yong
    Li, Ya-Cheng
    Ma, Jian-Feng
    Xu, Li
    Tongxin Xuebao/Journal on Communications, 2014, 35 (11): : 162 - 169
  • [2] A Caching-Based Privacy-Preserving Scheme for Continuous Location- Based Services
    Zhang, Shaobo
    Liu, Qin
    Wang, Guojun
    SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 : 73 - 82
  • [3] Dual Scheme Privacy-Preserving Approach for Location-Aware Application in Edge Computing
    Gu, Bruce
    Qu, Youyang
    Ahmed, Khandakar
    Ye, Wenjie
    Tan, Chenchen
    Miao, Yuan
    AD HOC NETWORKS AND TOOLS FOR IT, ADHOCNETS 2021, 2022, 428 : 301 - 316
  • [4] K-anonymous location privacy protection scheme for the mobile terminal
    Song C.
    Jin T.
    Ni S.
    He J.
    Du S.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 138 - 145
  • [5] K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data
    Meng, Linghang
    Hong, Xueshu
    Chen, Yingwen
    Ding, Yuke
    Zhang, Chengzhuo
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 381 - 393
  • [6] SLICER: A Slicing-Based K-Anonymous Privacy Preserving Scheme for Participatory Sensing
    Qiu, Fudong
    Wu, Fan
    Chen, Guihai
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 113 - 121
  • [7] K-Anonymous Privacy Preserving Manifold Learning
    Garg, Sonakshi
    Torra, Vicenc
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 37 - 48
  • [8] A Lightweight Privacy-Preserving Ciphertext Retrieval Scheme Based on Edge Computing
    Wang, Na
    Zhou, Wen
    Han, Qingyun
    Liu, Jianwei
    Liao, Weilue
    Fu, Junsong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (04) : 1273 - 1290
  • [9] A k-anonymous approach to privacy preserving collaborative filtering
    Casino, Fran
    Domingo-Ferrer, Josep
    Patsakis, Constantinos
    Puig, Domenec
    Solanas, Agusti
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (06) : 1000 - 1011
  • [10] An Efficient Computing Offloading Scheme Based on Privacy-Preserving in Mobile Edge Computing Networks
    Pang, Shanchen
    Sun, Huanhuan
    Wang, Min
    Wang, Shuyu
    Qiao, Sibo
    Xiong, Neal N.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022