A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing

被引:37
|
作者
Zhang, Shiwen [1 ]
Hu, Biao [1 ]
Liang, Wei [1 ]
Li, Kuan-Ching [2 ]
Gupta, Brij B. [3 ,4 ,5 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Providence Univ, Dept Comp Sci & Informat Engn, Taichung 43301, Taiwan
[3] Macquarie Univ, Fac Sci & Engn, Macquarie Pk, NSW 2109, Australia
[4] Symbiosis Int Univ, Symbiosis Ctr Informat Technol, Pune 411115, India
[5] Univ Petr & Energy Studies, Ctr Interdisciplinary Res, Dehra Dun 110048, India
基金
中国国家自然科学基金;
关键词
Privacy; Servers; Computer architecture; Task analysis; Edge computing; Costs; Encryption; Caching; dual K-anonymity; edge computing; K-anonymity; location privacy; location-based services; TASK ALLOCATION; USERS;
D O I
10.1109/JIOT.2023.3235707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location-based services have become prevalent and the risk of location privacy leakage increases. Most existing schemes use third-party-based or third-party-free system architectures; the former suffers from a single point of failure (SPOF) and the latter experiences a heavy load on user terminal equipment and higher communication costs. Ensuring location privacy while lowering system overhead becomes a challenge. Many existing schemes fail to leverage the responses from an LBS server; such responses can be cached to answer subsequent queries. As a result, providing users with a relatively comprehensive level of location privacy protection is troublesome. In this article, we propose a caching-based dual K-anonymous (CDKA) location privacy-preserving scheme in edge computing environments. Our scheme employs an edge server to intercedes between a user and LBS the server. We reduce the load on the user device by applying multilevel caching and to protect location privacy through dual anonymity. To ensure the location privacy in our construction, we set mobile clients and edge servers as anonymous. We use caching to lower the communication overhead and enforce the location privacy. The security analysis of our scheme supports its robustness against the edge server and the LBS server privacy offenses. We rely on the computation time, the communication cost, and the cache hit ratio to evaluate our work against existing constructions. The results are twofold: our work possesses a better response rate down to 15-32.6 ms and exhibits lower communication cost requirements down to 6.2-38.9 kB compared to existing works. Our scheme witnesses a higher cache hit ratio of up to 13.6% and 39.1% compared to the literature.
引用
收藏
页码:9768 / 9781
页数:14
相关论文
共 50 条
  • [1] A Caching-Based Privacy-Preserving Scheme for Continuous Location- Based Services
    Zhang, Shaobo
    Liu, Qin
    Wang, Guojun
    SECURITY, PRIVACY AND ANONYMITY IN COMPUTATION, COMMUNICATION AND STORAGE, (SPACCS 2016), 2016, 0067 : 73 - 82
  • [2] Location privacy-preserving method of k-anonymous based on service similarity
    Ye, A-Yong
    Li, Ya-Cheng
    Ma, Jian-Feng
    Xu, Li
    Tongxin Xuebao/Journal on Communications, 2014, 35 (11): : 162 - 169
  • [3] A Lightweight Privacy-Preserving Ciphertext Retrieval Scheme Based on Edge Computing
    Wang, Na
    Zhou, Wen
    Han, Qingyun
    Liu, Jianwei
    Liao, Weilue
    Fu, Junsong
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (04) : 1273 - 1290
  • [4] Dual Scheme Privacy-Preserving Approach for Location-Aware Application in Edge Computing
    Gu, Bruce
    Qu, Youyang
    Ahmed, Khandakar
    Ye, Wenjie
    Tan, Chenchen
    Miao, Yuan
    AD HOC NETWORKS AND TOOLS FOR IT, ADHOCNETS 2021, 2022, 428 : 301 - 316
  • [5] Deniable-Based Privacy-Preserving Authentication Against Location Leakage in Edge Computing
    Zeng, Shengke
    Zhang, Hongjie
    Hao, Fei
    Li, Hongwei
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 1729 - 1738
  • [6] Accurate and Privacy-Preserving Task Allocation for Edge Computing Assisted Mobile Crowdsensing
    Wang, Zhihua
    Guo, Chaoqi
    Liu, Jiahao
    Zhang, Jiamin
    Wang, Yongjian
    Luo, Jingtang
    Yang, Xiaolong
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 9 (01) : 120 - 133
  • [7] PriTAEC: Privacy-Preserving Task Assignment Based on Oblivious Transfer and Edge Computing in VANET
    Xu, Zihui
    Wu, Lei
    Qin, Chengyi
    Li, Su
    Zhang, Songnian
    Lu, Rongxing
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (04) : 4996 - 5009
  • [8] A Trajectory Privacy-Preserving Scheme Based on Transition Matrix and Caching for IIoT
    Zhang, Shiwen
    Hu, Biao
    Liang, Wei
    Li, Kuan-Ching
    Pathan, Al-Sakib Khan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5745 - 5756
  • [9] K-anonymous location privacy protection scheme for the mobile terminal
    Song C.
    Jin T.
    Ni S.
    He J.
    Du S.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 138 - 145
  • [10] Privacy-Preserving Image Watermark Embedding Method Based on Edge Computing
    Cheng, Hang
    Huang, Qinjian
    Chen, Fei
    Wang, Meiqing
    Yan, Wanxi
    IEEE ACCESS, 2022, 10 : 18570 - 18582