Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach

In this paper, we consider user location privacy in mobile edge clouds (MECs). MECs are small clouds deployed at the network edge to offer cloud services close to mobile users, and many solutions have been proposed to maximize service locality by migrating services to follow their users. Co-location of a user and his service, however, implies that a cyber eavesdropper observing service migrations between MECs can localize the user up to one MEC coverage area, which can be fairly small (e.g., a femtocell). We consider using chaff services to defend against such an eavesdropper, with a focus on strategies to control the chaffs. Assuming the eavesdropper performs maximum likelihood detection, we consider both heuristic strategies that mimic the user’s mobility and optimized strategies designed to minimize the detection or tracking accuracy. We show that a single chaff controlled by the optimal strategy or its online variation can drive the eavesdropper’s tracking accuracy to zero when the user’s mobility is sufficiently random. We further propose extended strategies that utilize randomization to defend against an advanced eavesdropper aware of the strategy. The efficacy of our solutions is verified through both synthetic and trace-driven simulations.

[1]  Nitin H. Vaidya,et al.  Power-Aware Traffic Cover Mode to Prevent Traffic Analysis in Wireless Ad Hoc Networks , 2000 .

[2]  Mahadev Satyanarayanan,et al.  Adaptive VM Handoff Across Cloudlets , 2015 .

[3]  Marco Gruteser,et al.  USENIX Association , 1992 .

[4]  Helen J. Wang,et al.  Preserving location privacy in wireless lans , 2007, MobiSys '07.

[5]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[6]  Romit Roy Choudhury,et al.  Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.

[7]  Malek Ben Salem,et al.  Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[8]  Panos Kalnis,et al.  Providing K-Anonymity in location based services , 2010, SKDD.

[9]  Chi-Yin Chow,et al.  Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments , 2011, GeoInformatica.

[10]  Ting He,et al.  Location Privacy in Mobile Edge Clouds , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[11]  Alan Magar Assessing the Use of Tactical Clouds to Enhance Warfighter Effectiveness , 2014 .

[12]  José Neves,et al.  Decision Making and Quality-of-Information , 2010, SOCO.

[13]  Suman Banerjee,et al.  Final report from the NSF Workshop on Future Directions in Wireless Networking , 2013 .

[14]  V. Climenhaga Markov chains and mixing times , 2013 .

[15]  Maria Ebling,et al.  An open ecosystem for mobile-cloud convergence , 2015, IEEE Communications Magazine.

[16]  Kin K. Leung,et al.  Mobility-Induced Service Migration in Mobile Micro-clouds , 2014, 2014 IEEE Military Communications Conference.

[17]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[18]  Kin K. Leung,et al.  Dynamic service migration in mobile edge-clouds , 2015, 2015 IFIP Networking Conference (IFIP Networking).

[19]  Tarik Taleb,et al.  Follow me cloud: interworking federated clouds and distributed mobile networks , 2013, IEEE Network.

[20]  J. Lamperti ON CONVERGENCE OF STOCHASTIC PROCESSES , 1962 .

[21]  Min Chen,et al.  A Markov Decision Process-based service migration procedure for follow me cloud , 2014, 2014 IEEE International Conference on Communications (ICC).

[22]  Ananthram Swami,et al.  Maximum throughput of clandestine relay , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[23]  Mahadev Satyanarayanan,et al.  The Role of Cloudlets in Hostile Environments , 2013, IEEE Pervasive Computing.

[24]  Matthias Grossglauser,et al.  CRAWDAD dataset epfl/mobility (v.2009-02-24) , 2009 .

[25]  Angelos D. Keromytis,et al.  Computational Decoys for Cloud Security , 2014, Secure Cloud Computing.

[26]  Tarik Taleb,et al.  Follow-Me Cloud: When Cloud Services Follow Mobile Users , 2019, IEEE Transactions on Cloud Computing.

[27]  Helen J. Wang,et al.  A Framework for Location Privacy in Wireless Networks , 2005 .

[28]  Kin K. Leung,et al.  Dynamic Service Placement for Mobile Micro-Clouds with Predicted Future Costs , 2015, IEEE Transactions on Parallel and Distributed Systems.