A Symbiotic Relationship Based Leader Approach for Privacy Protection in Location Based Services

被引:12
作者
Alrahhal, Hosam [1 ,2 ]
Alrahhal, Mohamad Shady [3 ]
Jamous, Razan [2 ]
Jambi, Kamal [3 ]
机构
[1] NAHDA Univ, Commun & Comp Engn Dept, Fac Engn, Bani Suwayf 62511, Egypt
[2] Univ Regina, Fac Engn & Appl Sci, Regina, SK S4S 0A2, Canada
[3] King Abdulaziz Univ, Fac Comp & Informat Technol, Dept Comp Sci, Jeddah 21589, Saudi Arabia
关键词
cache; attack launch; dummies; leader; privacy protection; reputation; SECURITY; INTERNET; IOT; CHALLENGES; ATTACKS;
D O I
10.3390/ijgi9060408
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location-based services (LBS) form the main part of the Internet of Things (IoT) and have received a significant amount of attention from the research community as well as application users due to the popularity of wireless devices and the daily growth in users. However, there are several risks associated with the use of LBS-enabled applications, as users are forced to send their queries based on their real-time and actual location. Attacks could be applied by the LBS server itself or by its maintainer, which consequently may lead to more serious issues such as the theft of sensitive and personal information about LBS users. Due to this fact, complete privacy protection (location and query privacy protection) is a critical problem. Collaborative (cache-based) approaches are used to prevent the LBS application users from connecting to the LBS server (malicious parties). However, no robust trust approaches have been provided to design a trusted third party (TTP), which prevents LBS users from acting as an attacker. This paper proposed a symbiotic relationship-based leader approach to guarantee complete privacy protection for users of LBS-enabled applications. Specifically, it introduced the mutual benefit underlying the symbiotic relationship, dummies, and caching concepts to avoid dealing with untrusted LBS servers and achieve complete privacy protection. In addition, the paper proposed a new privacy metric to predict the closeness of the attacker to the moment of her actual attack launch. Compared to three well-known approaches, namely enhanced dummy location selection (enhanced-DLS), hiding in a mobile crowd, and caching-aware dummy selection algorithm (enhanced-CaDSA), our experimental results showed better performance in terms of communication cost, resistance against inferences attacks, and cache hit ratio.
引用
收藏
页数:22
相关论文
共 46 条
[1]   Fog Computing for the Internet of Things: Security and Privacy Issues [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Cheng, Xiuzhen .
IEEE INTERNET COMPUTING, 2017, 21 (02) :34-42
[2]   Towards Understanding Location Privacy Awareness on Geo-Social Networks [J].
Alrayes, Fatma ;
Abdelmoty, Alia I. .
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2017, 6 (04)
[3]  
[Anonymous], 2006, P INT PAR DISTR PROC
[4]  
[Anonymous], 2006, VLDB, DOI DOI 10.1145/1620585.1620591
[5]  
[Anonymous], 2009, THESIS
[6]  
[Anonymous], P IEEE INFOCOM 2014
[7]  
Ardagna CA, 2007, LECT NOTES COMPUT SC, V4602, P47
[8]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[9]  
Cassell C, 2011, ROUTL ADV MANAG BUS, P1
[10]   Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey [J].
Chen, Liang ;
Thombre, Sarang ;
Jarvinen, Kimmo ;
Lohan, Elena Simona ;
Alen-Savikko, Anette ;
Leppakoski, Helena ;
Bhuiyan, M. Zahidul H. ;
Bu-Pasha, Shakila ;
Ferrara, Giorgia Nunzia ;
Honkala, Salomon ;
Lindqvist, Jenna ;
Ruotsalainen, Laura ;
Korpisaari, Paivi ;
Kuusniemi, Heidi .
IEEE ACCESS, 2017, 5 :8956-8977