Private retrieval of location-related content using k-anonymity and application to ICN

被引:2
作者
Kita, Kentaro [1 ]
Koizumi, Yuki [1 ]
Hasegawa, Toru [1 ]
机构
[1] Osaka Univ, Grad Sch Informat Sci & Technol, Osaka, Japan
关键词
Information-centric networking; Privacy; Anonymity; Location; Internet of Things; ALGORITHM; INTERNET;
D O I
10.1016/j.comnet.2022.108908
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Several platforms to efficiently retrieve content from Internet of Things (IoT) devices installed in various locations have been proposed for information-centric networking (ICN). However, location privacy is at stake in such platforms because consumers retrieve content by specifying the plaintext names of the locations of their interest (LOIs). Previous studies on IP have leveraged k-anonymity of location offered by a trusted proxy called an anonymizer to hide LOIs. Specifically, an anonymizer sends content requests to k locations in a location anonymity set, which comprises an LOI and the other dummy locations. This technique can be applied to ICN; however, two problems need to be solved: the adversary models are unrealistic and the requirements for a location anonymity set have been defined in ad-hoc manners. In this study, we assume a semi-honest anonymizer and define the requirements rigorously using the notions of entropy and t-closeness. Next, we design an architecture for location privacy protection and an algorithm for location anonymity set generation. Finally, we evaluate the overhead incurred by our architecture and the quality of generated location anonymity sets through experiments under a realistic scenario. Our results indicate that our architecture and algorithm offer strong location privacy with marginal overhead.
引用
收藏
页数:14
相关论文
共 50 条
[1]  
Aguilar-Melchor Carlos, 2016, Proceedings on Privacy Enhancing Technologies, V2016, P155, DOI 10.1515/popets-2016-0010
[2]   Information-Centric Networking for the Internet of Things: Challenges and Opportunities [J].
Amadeo, Marica ;
Campolo, Claudia ;
Quevedo, Jose ;
Corujo, Daniel ;
Molinaro, Antonella ;
Iera, Antonio ;
Aguiar, Rui L. ;
Vasilakos, Athanasios V. .
IEEE NETWORK, 2016, 30 (02) :92-100
[3]  
Andres M.E., 2013, C COMP COMM SEC SIGS
[4]   PIR with compressed queries and amortized query processing [J].
Angel, Sebastian ;
Chen, Hao ;
Laine, Kim ;
Setty, Srinath .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :962-979
[5]  
[Anonymous], 2014, 23 INT C COMPUTER CO
[6]  
[Anonymous], 2006, VLDB, DOI DOI 10.1145/1620585.1620591
[7]  
[Anonymous], 1995, ANONYMIZER
[8]   A Keyword-based ICN-IoT Platform [J].
Ascigil, Onur ;
Rene, Sergi ;
Xylomenos, George ;
Psaras, Ioannis ;
Pavlou, George .
PROCEEDINGS OF THE 4TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN 2017), 2017, :22-28
[9]  
Bettini C, 2005, LECT NOTES COMPUT SC, V3674, P185
[10]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88