Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach
暂无分享,去创建一个
Ting He | Shiqiang Wang | Kevin S. Chan | Ertugrul Necdet Ciftcioglu | Shiqiang Wang | T. He | K. Chan | E. Ciftcioglu
[1] Nitin H. Vaidya,et al. Power-Aware Traffic Cover Mode to Prevent Traffic Analysis in Wireless Ad Hoc Networks , 2000 .
[2] Mahadev Satyanarayanan,et al. Adaptive VM Handoff Across Cloudlets , 2015 .
[3] Marco Gruteser,et al. USENIX Association , 1992 .
[4] Helen J. Wang,et al. Preserving location privacy in wireless lans , 2007, MobiSys '07.
[5] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[6] Romit Roy Choudhury,et al. Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.
[7] Malek Ben Salem,et al. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[8] Panos Kalnis,et al. Providing K-Anonymity in location based services , 2010, SKDD.
[9] Chi-Yin Chow,et al. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments , 2011, GeoInformatica.
[10] Ting He,et al. Location Privacy in Mobile Edge Clouds , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[11] Alan Magar. Assessing the Use of Tactical Clouds to Enhance Warfighter Effectiveness , 2014 .
[12] José Neves,et al. Decision Making and Quality-of-Information , 2010, SOCO.
[13] Suman Banerjee,et al. Final report from the NSF Workshop on Future Directions in Wireless Networking , 2013 .
[14] V. Climenhaga. Markov chains and mixing times , 2013 .
[15] Maria Ebling,et al. An open ecosystem for mobile-cloud convergence , 2015, IEEE Communications Magazine.
[16] Kin K. Leung,et al. Mobility-Induced Service Migration in Mobile Micro-clouds , 2014, 2014 IEEE Military Communications Conference.
[17] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[18] Kin K. Leung,et al. Dynamic service migration in mobile edge-clouds , 2015, 2015 IFIP Networking Conference (IFIP Networking).
[19] Tarik Taleb,et al. Follow me cloud: interworking federated clouds and distributed mobile networks , 2013, IEEE Network.
[20] J. Lamperti. ON CONVERGENCE OF STOCHASTIC PROCESSES , 1962 .
[21] Min Chen,et al. A Markov Decision Process-based service migration procedure for follow me cloud , 2014, 2014 IEEE International Conference on Communications (ICC).
[22] Ananthram Swami,et al. Maximum throughput of clandestine relay , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[23] Mahadev Satyanarayanan,et al. The Role of Cloudlets in Hostile Environments , 2013, IEEE Pervasive Computing.
[24] Matthias Grossglauser,et al. CRAWDAD dataset epfl/mobility (v.2009-02-24) , 2009 .
[25] Angelos D. Keromytis,et al. Computational Decoys for Cloud Security , 2014, Secure Cloud Computing.
[26] Tarik Taleb,et al. Follow-Me Cloud: When Cloud Services Follow Mobile Users , 2019, IEEE Transactions on Cloud Computing.
[27] Helen J. Wang,et al. A Framework for Location Privacy in Wireless Networks , 2005 .
[28] Kin K. Leung,et al. Dynamic Service Placement for Mobile Micro-Clouds with Predicted Future Costs , 2015, IEEE Transactions on Parallel and Distributed Systems.