Status | 已发表Published |
Title | Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services |
Creator | |
Date Issued | 2017 |
Source Publication | IEEE Access
![]() |
ISSN | 2169-3536 |
Volume | 5Pages:7692-7701 |
Abstract | The development of mobile cloud computing technology has made location-based service (LBS) increasingly more popular. Given the continuous requests to cloud LBS servers, the amounts of location and trajectory information collected by LBS servers are continuously increasing. Privacy awareness for LBS has been extensively studied in recent years. Among the privacy concerns about LBS, trajectory privacy preservation is particularly important. Based on privacy preservation models, previous work have mainly focused on peer-To-peer and centralized architectures. However, the burden on users is heavy in peer-To-peer architectures, because user devices need to communicate with LBS servers directly. In centralized architectures, a trusted third party (TTP) is introduced, and acts as a bridge between users and the LBS server. Anonymity technologies, such as k-Anonymity, mix-zone, and dummy technologies, are usually implemented by the TTP to ensure safety. There are certain drawbacks in TTP architectures: Users have no physical control of the TTP. Moreover, the TTP is more attractive to adversaries, because substantially more sensitive information is stored by the TTP. To solve the above-mentioned problems, in this paper, we propose a fog structure to store partial important data with the dummy anonymity technology to ensure physical control, which can be considered as absolutely trust. Compared with cloud computing, fog computing is a promising technique that extends the cloud computing to the edge of a network. Moreover, fog computing provides local computation and storage abilities, wide geo-distribution, and support for mobility. Therefore, mobile users' partial important information can be stored on a fog server to ensure better management. We take the principles of similarity, intersection, practicability, and correlation into consideration and design a dummy rotation algorithm with several properties. The effectiveness of the proposed method is validated through extensive simulations, which show that the proposed method can provide enhanced privacy preservation. |
Keyword | fog computing LBS privacy rotation trajectory privacy preservation |
DOI | 10.1109/ACCESS.2017.2698078 |
URL | View source |
Indexed By | SCIE |
Language | 英语English |
WOS Research Area | Computer Science ; Engineering ; Telecommunications |
WOS Subject | Computer Science, Information Systems ; Engineering, Electrical & Electronic ; Telecommunications |
WOS ID | WOS:000403140800079 |
Scopus ID | 2-s2.0-85028358232 |
Citation statistics | |
Document Type | Journal article |
Identifier | http://repository.uic.edu.cn/handle/39GCC9TT/7248 |
Collection | Research outside affiliated institution |
Corresponding Author | Tian, Hui |
Affiliation | 1.Department of Computer Science and Technology, Huaqiao University, Xiamen, 361021, China 2.Department of Computer and Information Sciences, Fordham University, Bronx, 10458, United States |
Recommended Citation GB/T 7714 | Wang, Tian,Zeng, Jiandian,Bhuiyan, Md Zakirul Alamet al. Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services[J]. IEEE Access, 2017, 5: 7692-7701. |
APA | Wang, Tian., Zeng, Jiandian., Bhuiyan, Md Zakirul Alam., Tian, Hui., Cai, Yiqiao., .. & Zhong, Bineng. (2017). Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services. IEEE Access, 5, 7692-7701. |
MLA | Wang, Tian,et al."Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services". IEEE Access 5(2017): 7692-7701. |
Files in This Item: | There are no files associated with this item. |
Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.
Edit Comment